نتایج جستجو برای: unauthorized tissues

تعداد نتایج: 198978  

2015
Abhishek Mukherjee

In recent years database security has become one of the major issues in computer security. Database security is concerned with preventing unauthorized and malicious access into a database. A number of mechanisms needed to defend information, such as verification, user privileges, data encryption, and auditing, are available in DBMS. In reality, malicious access of databases by unauthorized user...

2006
Hong-Zhi Zhang Wei-Ming Yeh Wei-Min Yang Rui-Xi Chen

Digital photos are very popular on the Internet; unfortunately, unauthorized distribution and use of these photos is very common. To prevent unauthorized use, an author can place a watermark on the image, but this technology has not been implemented in an embedded system. Without an instant watermark and encryption option on digital cameras and e-albums, the user must manipulate online photos w...

2005
Susan L Crockin

Both reproductive medicine and genetics are seeing rapid, and in some instances revolutionary, medical and scientific advances. Courtshavebeencailedupontoresolveavariety of novel disputes arising from these areas, and more can be anticipated as these technologies continue to develop and their use becomes more widespread. This article discusses some of the most relevant areas of the law and liti...

Journal: :CoRR 2011
Aman Chadha Sandeep Gangundi Rishabh Goel Hiren Dave M. Mani Roja

In recent times, communication through the internet has tremendously facilitated the distribution of multimedia data. Although this is indubitably a boon, one of its repercussions is that it has also given impetus to the notorious issue of online music piracy. Unethical attempts can also be made to deliberately alter such copyrighted data and thus, misuse it. Copyright violation by means of una...

2012
U. J. Raju K. G. Revathi K. Raghava Rao

The Hypertext Transfer Protocol (HTTP) is an application protocol for distributed, collaborative, hypermedia information systems. HTTP is the foundation of data communication for the World Wide Web. HTTP is not only used for communication purpose, it is also used for file/data transfer, chatting, etc. The HTTPS protocol to guarantee privacy and security in transactions ranging from home banking...

2012
Kuljeet Kaur

Inbuilt physical security in wireless networks is not obtainable and unfortunately these are more prone to attacks from intruders. Resources are easily accessible, once an unauthorized access is gained. Paper elucidates numerous attacks which an intruder could use to detect and connect to the wireless network. Focus of the paper is on two technologies Wired Equivalent Privacy (WEP) and IEEE 802...

2017
Jelmer Brouwer Maartje van der Woude Joanne van der Leun

In this article we examine whether the proposal to criminalize illegal stay in the Netherlands was preceded by increased negative media attention for unauthorized immigrants. Using a corpus linguistics approach, we carried out a quantitative discourse analysis of all newspaper articles on unauthorized migrants over a period of 15 years. Our results show that the amount of media coverage actuall...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید