intTypePromotion=1
zunia.vn Tuyển sinh 2024 dành cho Gen-Z zunia.vn zunia.vn
ADSENSE

Application security

Xem 1-20 trên 82 kết quả Application security
  • This study examines the implementation of the case study method in teaching National Defense - Security Education in Ho Chi Minh City high schools. A survey of 50 teachers and 200 students from three high schools reveals that while the case study method has been introduced, its application remains limited, with an average score of 3.19.

    pdf10p viling 11-10-2024 1 1   Download

  • This paper introduces the application of artificial intelligence to build a security control software system in local military units. This software system uses state-of-the-art convolutional neural networks (CNN SOTA) for facial recognition by testing two of the best facial recognition models currently available: the FaceNet model and the VGGFace model.

    pdf8p vifilm 11-10-2024 6 1   Download

  • In recent years, landslides are taking place very seriously, and tend to increase in both scope and scale, threatening people's lives and properties. Therefore, timely detection of landslide areas is extremely important to minimize damage. In this paper, an improved algorithm for partitioning data with reliability problems using multiple fuzzifiers named as TSSFC is introduced.

    pdf9p viengfa 28-10-2024 5 2   Download

  • In this study, we propose a NOMA communication model combined with linear array antennas for the purpose of enhancing physical layer security. We introduce a model of 4 nodes: transmitter node S, receiver node D1, receiver node D2, eavesdropping node E.

    pdf10p viling 11-10-2024 2 1   Download

  • Efficient and accurate recognition of human interactions is crucial for numerous service applications, including security surveillance and public safety. In this paper, we propose a lightweight methodology for detecting human activity and interactions in video streams, specifically tailored for edge computing environments.

    pdf10p viyamanaka 06-02-2025 2 2   Download

  • Recent attacks, infections, and malicious code are mostly exploited by hackers as a potential vulnerability on unsecured user computers. The issue for administrators is how to protect hundreds of computers within the organization from such insecurity.

    pdf6p tuetuebinhan000 23-01-2025 3 2   Download

  • Photoluminescent composites that are air-stable and water-resistant are important for outdoor applications such as road marking paints, light-converting membranes, fluorescent paints, and security inks.

    pdf7p vibenya 31-12-2024 4 2   Download

  • PHP-Developer since the late 1920s I 2009 I tried out about 10(!!) different PHP Frameworks: Akelos PHP Framework Cake PHP Codeigniter Kahona Recess Solar Symfony1 Wombat Yii Zend Framework Database Access Objects (DAO), Query Builder, AR I Migration system to step up and down your migrations I Easy Console Applications I Routing you always wanted to have I Flexibility with Widgets (= View Helpers++) I Expandable with Extensions / Wrappers for 3rd party libs I Highly secure I Scaffolding...

    pdf42p nguyenvanhabk 22-06-2013 97 10   Download

  • “ Web 2.0 is a massive social experiment This is an opportunity to build a new kind of international understanding, not politician to politician, great man to great man, but citizen to citizen, person to person. It's a chance for people to look at a computer screen and really, genuinely wonder who's out there looking back at them. ”

    ppt54p hanthegiankid9x 25-06-2013 52 5   Download

  • Chapter 1: Undertanding the .NET Framework overview .NET Framework; understanding the common language runtime; understanding the managed excution process; understanding assemblies and the global assembly cache; cogfiguration and security; application domains and run times hosts.

    pdf35p cocacola_09 23-11-2015 63 3   Download

  • Lecture "Database security and auditing - Protecting data integrity and accessibility - Chapter 9: Auditing database activities" presentation of content: Audit server activities with Microsoft SQL Server 2000, audit database activities using Microsoft SQL Profiler, use SQL Server for security auditing. Mời các bạn tham khảo.

    ppt46p thangnamvoiva20 20-09-2016 83 3   Download

  • Lecture Database security and auditing - Protecting data integrity and accessibility - Chapter 8: Application Data Auditing presentation of content Create and implement Oracle triggers, create and implement SQL Server triggers, define and implement Oracle fine-grained auditing,... Mời các bạn cùng tham khảo.

    ppt37p thangnamvoiva20 20-09-2016 66 2   Download

  • Lecture Security+ Certification: Chapter 9 - System hardening. The main contents of this chapter include all of the following: Disable nonessential systems, harden operating systems, harden applications, harden networks.

    pdf39p nhanmotchut_3 20-10-2016 75 5   Download

  • Bài giảng "An toàn mạng máy tính nâng cao - Chương 6: Web application security" cung cấp cho người học các kiến thức về bảo mật ứng dụng Web, web application attack and defense. Đây là một tài liệu hữu ích dành cho các bạn sinh viên và những ai quan tâm dùng làm tài liệu học tập và nghiên cứu.

    pdf51p tieu_vu12 03-07-2018 108 15   Download

  • Lecture "On safety and security of information systems: Cryptographic hash funtionns" provide students with knowledge about: Hash function; Applications of cryptographic hash functions; Simple hash functions; Requirements and security;... Please refer to the detailed content of the lecture!

    pdf22p hoabingan205 12-12-2022 15 5   Download

  • This thesis intends to develop application-level access control models to address several major security issues in enterprise environments. The first goal is to provide simple and efficient authorization specifications to reduce the complexity of security management. The second goal is to provide dynamic access control for Web service applications. The third goal is to provide an access control framework for Semantic Web services. In this thesis, an Authorization-Function-Based Role-based Access Control (FB-RBAC) model is proposed for controlling enterprise systems at the application level.

    pdf182p runthenight07 01-03-2023 16 3   Download

  • The author identifies two research gaps of this topic, respectively: (1) Understanding and evaluating the current situation of fair value application in the accounting system of securities companies in Vietnam and (2) Find out the factors affecting the application of fair value in the accounting system of securities companies in Vietnam.

    pdf27p petsematary 06-06-2021 28 5   Download

  • The human population continues to grow steadily with the shrinking resources being used for agricultural production situates great challenge against Indian agricultural system to attain food and environmental security. To counter these twin challenges in the country there is urgent need of application of modern Hi-tech technologies for enhancing the productivity and sustainability of the rice-wheat system for long term on scientific basis. Precision farming (PF) looks a win-win technology towards improving the capability of agricultural land to produce crops on sustainable basis.

    pdf10p chauchaungayxua6 26-06-2020 25 2   Download

  • Chapter 5 - Wireless security. After studying this chapter you will be able to understand: Wireless concepts, Securing digital cellular telephony, wireless application protocol, wireless transport layer security, hardening wireless local area networks, IEEE 802.11, wired equivalent privacy (WEP).

    pdf20p nhanmotchut_3 20-10-2016 69 4   Download

  • Users and Security Security domain The database administrator defines the names of the users who are allowed to access a database. A security domain defines the settings that apply to the user. Authentication mechanism A user who requires access to the database can be authenticated by one of the following: Data dictionary Operating system Network The means of authentication is specified at the time the user is defined in the database and can be altered later. This lesson covers authentication by database and by operating system only.

    ppt20p trinh02 28-01-2013 83 3   Download

CHỦ ĐỀ BẠN MUỐN TÌM

ADSENSE

nocache searchPhinxDoc

 

Đồng bộ tài khoản
188=>2