نتایج جستجو برای: security needs
تعداد نتایج: 415429 فیلتر نتایج به سال:
Investments aimed at improving agricultural adaptation to climate change inevitably favor some crops and regions over others. An analysis of climate risks for crops in 12 food-insecure regions was conducted to identify adaptation priorities, based on statistical crop models and climate projections for 2030 from 20 general circulation models. Results indicate South Asia and Southern Africa as tw...
In this paper, we developed speaker verification system for mcommerce (mobile commerce) via wireless internet and WAP. We implemented the system as client-server architecture. The clients are mobile phone simulator and PDA. As the needs for wireless Internet service is increasing, the needs for secure mcommerce is also increasing. Conventional security technique are reinforced by biometric secu...
www.sciencemag.org (this information is current as of February 1, 2008 ): The following resources related to this article are available online at http://www.sciencemag.org/cgi/content/full/319/5863/607 version of this article at: including high-resolution figures, can be found in the online Updated information and services, http://www.sciencemag.org/cgi/content/full/319/5863/607/DC1 can be foun...
If you get the printed book in on-line book store, you may also find the same problem. So, you must move store to store and search for the available there. But, it will not happen here. The book that we will offer right here is the soft file concept. This is what make you can easily find and get this foundations of security what every programmer needs to know by reading this site. We offer you ...
the purpose of this study was to examine the english language needs of medical students at tehran university of medical sciences . analysis of the needs took place for three groups: 320 undergraduate students, 30 postgraduate students and 20 university instructors. a triangulation approach to collect data was used in which a combination of the quantitative (using the questionnaires) and qualita...
In last few decades large technology development raised various new needs. Financial sector has also no exception. People are approaching all over the world to fulfill there dreams. Any sector needs to understand changing need of customer. In order to satisfy financial need for customer banks are taking help of new technology such as internet. Only problem remain is of security. The aim of this...
Computer security incident response teams (CSIRTs) respond to a computer security incident when the need arises. Failure of these teams can have far-reaching effects for the economy and national security. CSIRTs often have to work on an ad hoc basis, in close cooperation with other teams, and in time constrained environments. It could be argued that under these working conditions CSIRTs would b...
With the proliferation of content rich web applications, content injection has become an increasing problem. Cross site scripting is the most prominent examples of this. Many systems have been designed to mitigate content injection and cross site scripting. Notable examples are BEEP, BLUEPRINT, and Content Security Policy, which can be grouped as HTML security policies. We evaluate these system...
The paper deals with the IT security development process according to the Common Criteria, particularly the security problem definition of the target of evaluation (TOE), expressing basic security concerns and needs of the developed IT product or system. The conciseness and preciseness of these concerns and needs influence the security objectives specifications that, in turn, influence the desi...
medical applications, security, distributed Computerized medical systems are emerging to help health care professionals cope with the difficult problems of patient data explosion and increasingly complex diagnostic information. The security of these medical information systems is extremely important one catastrophe could hamper their chance of success. The state-of-the-art security mechanisms c...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید