نتایج جستجو برای: bad mouthing attack
تعداد نتایج: 110943 فیلتر نتایج به سال:
OBJECTIVE To explore patient's perspectives and expectations from physicians with respect to breaking of bad news. METHODS A cross-sectional survey was carried out in the Community Health Centre of a tertiary care teaching hospital in Pakistan. All consenting individuals from 18 to 60 years of age were interviewed on the basis of a structured, pre-tested questionnaire. RESULTS The response ...
The IκB kinase complex (IKK) is a key regulator of immune responses, inflammation, cell survival, and tumorigenesis. The prosurvival function of IKK centers on activation of the transcription factor NF-κB, whose target gene products inhibit caspases and prevent prolonged JNK activation. Here, we report that inactivation of the BH3-only protein BAD by IKK independently of NF-κB activation suppre...
Denial of Service (DoS) or Distributed Denial of Service (DDoS) is a powerful attack which prevents the system from providing services to its legitimate users. Several approaches exist to filter network-level attacks, but application-level attacks are harder to detect at the firewall. Filtering at application level can be computationally expensive and difficult to scale, while still creating bo...
What may cause a heart attack build up gradually. Being a couch-potato, boredom eating without exercising are very bad habits that may possibly begin in when we are children. An increasing number of medical doctors are starting to find out victims of heart attacks in their 20's and 30's compared to sufferers mostly in their 50's and 60's. Being in shape and at the ideal weight does not make you...
THE JOINT surveillance and target attack radar system (JSTARS) promises to revolutionize how US forces conduct conventional warfare. Before the development of JSTARS, US forces de pended on close operations to defeat an enemy army. Because airpower’s ability to destroy an enemy’s mo bile ground forces was severely limited, especially during darkness and bad weather, interdiction proved import...
Traditionally, wireless network protocols have been developed for performance. Subsequently, as attacks are identified, patches or defenses have been developed. This has led to an “arms race,” where one is never confident about what other vulnerabilities may be exposed in the future. We seek to reverse this process. We identify a set of axioms describing a model, under which we develop a secure...
The infrastructure provided by wireless networks promises to have a significant impact on the way computing is performed. Not only will information be available while we are on the go, but new locationaware computing paradigms along with location-sensitive security policies will emerge. Already, many techniques have emerged to provide the ability to localize a communicating device [?], [1]–[4]....
Given the importance of international goods and materials to the American economy, closing our borders for more than a short period is infeasible. Furthermore, with our growing reliance on just-in-time delivery of foreign goods, even slowing the flow long enough to inspect either all or a statistically significant random selection of imports would be economically intolerable. However, the trans...
This white paper presents a method for protecting a Web application against online password-guessing attacks. A user logs in with three credentials: the name of the application instance, a user ID, and a password, where the instance name is a secret known only to the instance users, the user ID is a secret kwnon only to the instance administrators, and the password is a secret known only to the...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید