intTypePromotion=1
zunia.vn Tuyển sinh 2024 dành cho Gen-Z zunia.vn zunia.vn
ADSENSE

The system security

Xem 1-20 trên 64 kết quả The system security
  • This thesis intends to develop application-level access control models to address several major security issues in enterprise environments. The first goal is to provide simple and efficient authorization specifications to reduce the complexity of security management. The second goal is to provide dynamic access control for Web service applications. The third goal is to provide an access control framework for Semantic Web services. In this thesis, an Authorization-Function-Based Role-based Access Control (FB-RBAC) model is proposed for controlling enterprise systems at the application level.

    pdf182p runthenight07 01-03-2023 12 3   Download

  • Lecture "On safety and security of information systems: Access control" provide students with knowledge about: Four parts of access control; Types of access control; Formal models of access control;... Please refer to the detailed content of the lecture!

    pdf18p hoabingan205 12-12-2022 10 5   Download

  • Report "Accounting information system: E-Commerce business and accounting problems in E-commerce" has present the content: overview E-commerce and Accounting Information System (AIS); problems with accounting information systems at enterprises; information security; ensure that electronic systems for transmitting, receiving, and processing customer order information operate efficiently and provide accurate information;...

    pdf16p minhlong26052001 08-08-2022 18 8   Download

  • The author identifies two research gaps of this topic, respectively: (1) Understanding and evaluating the current situation of fair value application in the accounting system of securities companies in Vietnam and (2) Find out the factors affecting the application of fair value in the accounting system of securities companies in Vietnam.

    pdf27p petsematary 06-06-2021 27 5   Download

  • Models representing uncertainty factors; data mining techniques; calculation methods of power systems taking into account uncertainty factors.

    pdf31p gaocaolon6 30-07-2020 21 2   Download

  • The overall research objective of the thesis is to find solutions to perfect the organization of AIS at Vietnamese securities companies. Identify a theoretical framework for the organization of AIS at securities companies as a basis for the research process. Survey, analyze and assess the status of the organization of AIS at Vietnamese securities companies.

    pdf36p kequaidan6 15-07-2020 16 1   Download

  • In this article the work of the components of information of protection tools on the occurring violations, their types and the elimination of these violations and the possible trajectory of a change over time of the functioning states of information of protection tools with a discrete time are researched.

    pdf10p lucastanguyen 01-06-2020 18 3   Download

  • The human population continues to grow steadily with the shrinking resources being used for agricultural production situates great challenge against Indian agricultural system to attain food and environmental security. To counter these twin challenges in the country there is urgent need of application of modern Hi-tech technologies for enhancing the productivity and sustainability of the rice-wheat system for long term on scientific basis. Precision farming (PF) looks a win-win technology towards improving the capability of agricultural land to produce crops on sustainable basis.

    pdf10p chauchaungayxua6 26-06-2020 22 2   Download

  • The present study measured the public distribution of essential commodities in Punjab by check out the different types of ration cards and ration commodities and analyze the responses given by the respondents of this study, about their satisfaction with quality, price and quantity of these commodities distributed under the Public Distribution System.

    pdf10p guineverehuynh 20-06-2020 9 2   Download

  • Pest control practices in the vegetable crops have been heavily dominated by the routine use of broad-spectrum insecticides to control pests. Concerns have emerged about the adverse consequences of over use of pesticide. These consequences include short and longterm health hazards, contamination and environmental degradation. To minimize the pest losses farmers heavily depend on the chemical pesticides and accessing pest management information from the pesticide dealers due to weak state extension support system.

    pdf9p nguaconbaynhay5 16-05-2020 19 3   Download

  • Architecture of an ISO/IEC 17025 Quality Management System (QMS) for IT Security

    Evaluation Labs: RASIC and Processes, General structure of the QMS documentation, Setting-up, Operating and Maintaining the QMS.

    Reference: IoT security standards

    pdf9p tradaviahe12 23-04-2019 2505 2   Download

  • The thesis topic "Impact of the development of socialist-oriented market economy on protecting the sovereignty and security of national borders in the Northern border provinces" is an independent research project, containing the dedication of the author, based on applying the system of theoretical perspectives of Marxism - Leninism and Ho Chi Minh’s ideology; guidelines and policies of the Party; directives and leadership resolutions of the Party

    pdf12p change12 30-06-2016 49 1   Download

  • In this chapter, students will be able to understand: Password policies ensure that users choose effective passwords; user-level security requires a separate account for each user; in share-level security, all users access shares by using the same passwords; a firewall is a hardware or software product that protects a network from unauthorized access, using techniques such as packet filtering, NAT, or proxy servers;...

    pdf15p tangtuy08 21-04-2016 36 3   Download

  • We take a critical look at the relationship between the security of cryptographic schemes in the Random Oracle Model, and the security of the schemes that result from implementing the random oracle by so called \cryptographic hash functions". The main result of this paper is a negative one: There exist signature and encryption schemes that are secure in the Random Oracle Model, but for which any implementation of the random oracle results in insecure schemes.

    pdf37p tai_lieu2014 11-04-2014 65 7   Download

  • Cùng với sự phát triển của đất nước, hàng loạt công ty lớn nhỏ mọc lên với số lượng máy vi tính, vậy để làm gì để những người quản lý có thể quản lý một số lượng lớn người dùng lớn như vậy được, System Policy và Group Policy ra đời giúp những người quản lý một số lượng lớn người dùng một cách dễ dàng, đảm bảo được độ bảo mật của dữ liệu…

    doc58p votranthachthao1992 13-05-2013 220 75   Download

  • IEEE 802.11 is a set of standards for implementing wireless local area network (WLAN) computer communication in the 2.4, 3.6, 5 and 60 GHz frequency bands. They are created and maintained by the IEEE LAN/MAN Standards Committee (IEEE 802). The base version of the standard was released in 1997 and has had subsequent amendments. These standards provide the basis for wireless network products using the Wi-Fi brand.

    ppt18p muathu_102 28-01-2013 57 5   Download

  • The Web has become the visible interface of the Internet Many corporations now use the Web for advertising, marketing and sales Web servers might be easy to use but… Complicated to configure correctly and difficult to build without security flaws They can serve as a security hole by which an adversary might be able to access other data and computer systems

    ppt19p muathu_102 28-01-2013 47 4   Download

  • An integrated collection of tools for network monitoring and control. Single operator interface Minimal amount of separate equipment. Software and network communications capability built into the existing equipment SNMP key elements: Management station Managament agent Management information base Network Management protocol Get, Set and Notify

    ppt20p muathu_102 28-01-2013 71 3   Download

  • Security Attack: Any action that compromises the security of information. Security Mechanism: A mechanism that is designed to detect, prevent, or recover from a security attack. Security Service: A service that enhances the security of data processing systems and information transfers. A security service makes use of one or more security mechanisms.

    ppt14p muathu_102 28-01-2013 78 6   Download

  • Users and Security Security domain The database administrator defines the names of the users who are allowed to access a database. A security domain defines the settings that apply to the user. Authentication mechanism A user who requires access to the database can be authenticated by one of the following: Data dictionary Operating system Network The means of authentication is specified at the time the user is defined in the database and can be altered later. This lesson covers authentication by database and by operating system only.

    ppt20p trinh02 28-01-2013 82 3   Download

CHỦ ĐỀ BẠN MUỐN TÌM

ADSENSE

nocache searchPhinxDoc

 

Đồng bộ tài khoản
2=>2