intTypePromotion=1
zunia.vn Tuyển sinh 2024 dành cho Gen-Z zunia.vn zunia.vn
ADSENSE

Access to information

Xem 1-20 trên 30 kết quả Access to information
  • This study was conducted. Moreover, it is shown that choosing the best Tx/Rx parameters is necessary to meet service quality requirements such as BER and transmission confidentiality. The provided findings provide insightful information about the practical considerations of deploying UWOC/ CDMA systems.

    pdf11p viengfa 28-10-2024 3 1   Download

  • This study aims to assess the current status of accessing to information on gender equality in ethnic minority areas in Thai Nguyen province; thereby proposing solutions to improve people’s awareness of this issue in the study area.

    pdf9p viengfa 28-10-2024 3 1   Download

  • Media and information literacy (MIL) is crucial for Gen Z students in learning English especially when they access diverse information. This article aims to develop a toolkit for high school students to practice and improve their MIL skills in English learning within the Vietnamese educational context.

    pdf10p tuetuebinhan000 23-01-2025 6 2   Download

  • This short book is my answer to their question. This book will reference modern research, but it is not a book for scholars. This book will contain information that will benefit English teachers, but it is not a book for teachers. This is a book for you, the student. In my reading, much of the literature concerning language acquisition theory and research are designed for teachers.

    ppt225p blackjame2008 22-04-2010 343 213   Download

  • Rationale: ICTs have changed the way information is created and distributed. They have also changed the way libraries select, acquire, organize and deliver information. Library automation has. By the end of the lesson you should be able to: Define library automation Define an automated/Integrated Library System and identify as general features. Be aware of standards. Define an online public access catalog/web catalog Indentify the binifit of Library automation Identify potentail difficult in imple menting library automation ...

    ppt32p hoangyen999 04-05-2013 42 3   Download

  • Overview Access Control Matrix model Discretionary Access Control (DAC) Mandatory Access Control (MAC) and an example model Role Based Access Control (RBAC) Access Control in Unix Sep 2009 Information Security by Van K Nguyen Hanoi University of Technology 2 .What is AC Quote from Ross Anderson (text “Security Engineering”) Its function is to control which principals (persons, processes, machines, …) have access to which resources in the system -- which files they can read, which programs they can execute, and how they share data with other principals, and so on....

    pdf58p trinhvietnambk 29-05-2013 79 9   Download

  • Chapter 4 - Remote access. Objectives in this chapter: Understand implications of IEEE 802.1x and how it is used, understand VPN technology and its uses for securing remote access to networks, understand how RADIUS authentication works, understand how TACACS+ operates, understand how PPTP works and when it is used,...

    pdf54p nhanmotchut_3 20-10-2016 81 5   Download

  • This research focuses on two key research questions: how to measure spatial accessibility to green space in urban areas at fine resolution; and what is the status of spatial inequity in accessibility to green space in the MMA. Guided by the two research questions and based on a systematic review of literature on accessibility in general accessibility to green space in particular, a methodology has been developed for producing results needed to answer the research questions.

    pdf246p runthenight05 01-03-2023 9 3   Download

  • Lecture "On safety and security of information systems: Access control" provide students with knowledge about: Four parts of access control; Types of access control; Formal models of access control;... Please refer to the detailed content of the lecture!

    pdf18p hoabingan205 12-12-2022 12 5   Download

  • The purpose of this study was to create a media sale clear and easily accessible by the consumer as well as easy to be managed by the smal business (CV. Tanaka Service).

    pdf7p lucastanguyen 01-06-2020 34 3   Download

  • Pest control practices in the vegetable crops have been heavily dominated by the routine use of broad-spectrum insecticides to control pests. Concerns have emerged about the adverse consequences of over use of pesticide. These consequences include short and longterm health hazards, contamination and environmental degradation. To minimize the pest losses farmers heavily depend on the chemical pesticides and accessing pest management information from the pesticide dealers due to weak state extension support system.

    pdf9p nguaconbaynhay5 16-05-2020 22 3   Download

  • Due to the premature stage of big data research, the supply has not been able to keep up with the demand from organizations that want to leverage on big data analytics. Big data explorers and big data adopters struggle with access to qualitative as well as quantitative research on big data. The lack of access to big data know-how information, best practice advice and guidelines drove this study. The objective is to contribute to efforts being made to support a wider adoption of big data analytics.

    pdf99p nguyenyenyn117 14-06-2019 56 4   Download

  • With the adoption of the third Manifesto by UNESCO in 1994, we once again have an international document which expresses the desirable goals for library developments in all member states, even if the roads towards the goals appear to be of varying lengths.

    ppt11p hoangyen999 05-05-2013 49 5   Download

  • Government information is often not mobile friendly; increasing accessibility (especially of local information) is one way libraries can serve diverse users. Some libraries are providing services of this type in a desktop-oriented way already. This chapter discusses tools that can be used to make such sites more mobile friendly, including ones requiring little funds or technical background. The most obvious way to leverage patrons’ mobile devices is to put content on the Web.

    pdf10p heouheocoi1 15-04-2013 92 27   Download

  • [ 15 N]-heteronuclear single quantum coherence (HSQC) spectra provide a readily accessible fingerprint of [ 15 N]-labelled proteins, where the backbone amide group of each nonproline amino acid residue contributes a single cross-peak. Cell-free protein synthesis offers a fast and economical route to enhance the information content of [ 15 N]-HSQC spectra by amino acid type selective [ 15 N]-labelling.

    pdf6p inspiron33 25-03-2013 47 5   Download

  • The 21st century is bringing a flood of genomic sequence data from diverse species and although this information is highly accessible, we are far from understanding its content. Recent discoveries, for example on novel RNA types, clearly show that there is still much to learn.

    pdf1p media19 05-03-2013 33 3   Download

  • The Web has become the visible interface of the Internet Many corporations now use the Web for advertising, marketing and sales Web servers might be easy to use but… Complicated to configure correctly and difficult to build without security flaws They can serve as a security hole by which an adversary might be able to access other data and computer systems

    ppt19p muathu_102 28-01-2013 51 4   Download

  • Protect web content from those who don’t have a “need to know” Require users to authenticate using a userid/password before they are allowed access to certain URLs HTTP/1.1 requires that when a user makes a request for a protected resource the server responds with a authentication request header WWW-Authenticate contains enough pertinent information to carry out a “challenge-response” session between the user and the server

    ppt13p muathu_102 28-01-2013 52 3   Download

  • Upon completing this lesson, you will be able to: Use Telnet to connect to remote network devices, given operational access layer switches and routers Use IOS commands to manage the Telnet sessions, given operational access layer switches and routers

    ppt10p trinhvang 25-01-2013 52 4   Download

  • The aim of the proposed activity is to enhance Viet Nam’s capacity for teaching and research and development in the citrus sub-sector of agriculture. This will be achieved by the publication of reference texts and the development of high quality curricula for farmer field schools (FFS) in citrus IPM. The three Vietnamese texts will incorporate the research results of ACIAR project CS2/96/176, current information not easily accessed in Viet Nam and new information collected from throughout Viet Nam as part of the activity.

    pdf17p tam_xuan 02-03-2012 54 5   Download

CHỦ ĐỀ BẠN MUỐN TÌM

ADSENSE

nocache searchPhinxDoc

 

Đồng bộ tài khoản
24=>0