نتایج جستجو برای: unauthorized tissues

تعداد نتایج: 198978  

2010
Mark Russinovich

Revised June 1, 1998 Page 1 of 15 Preventing unauthorized access to sensitive data is essential in environments in which multiple users have access to the same physical or network resources. Operating systems (OSs) and individual users must be able to protect files, memory, and configuration settings from unauthorized viewing and modification. OS security includes obvious mechanisms such as acc...

Journal: :CoRR 2012
Ikuesan R. Adeyemi Norafida Ithnin

Security and Privacy concerns in Radio frequency identification (RFID) technology particularly RFID Card, is a wide research area which have attracted researchers for over a decade. Authenticating users at the Card end of the RFID technology constitutes one of the major sources of attacks on the system. In this research, we studied the various known attacks and mitigation available. We proposed...

Journal: :iranian journal of pathology 2011
krishnamurthy jayashree divya kota nagappa

bronchiolo-alveolar carcinoma with subcutaneous chest wall metastasis is a very rare presentation. a case of 36- year-old male with metastatic subcutaneous chest nodule of bronchiolo-alveolar carcinoma, diagnosed by fine needle aspiration cytology, is reported here. cutaneous metastases are of diagnostic importance because they may be the first manifestation of an undiscovered internal malignan...

Journal: :modares journal of medical sciences: pathobiology 2010
zahra tahmasebi fard kazem parivar leila barzegar yarmohammadi mohammad mehdi akhondi mahmoud jeddi tehrani

objective: the lrr (leucine rich proteoglycans) is a molecular recognition motif found in proteins with some roles in cell adhesion, signal transduction, dna repair and rna processing. opticin is a member of this family. takanosu et al (2001) detected messenger rna expression of mouse opticin in the eye, heart, brain, testis, thyroid and epididymis by dot blot hybridization. in this study, exp...

Journal: :international journal of aquatic biology 0
fatemeh kardel faculty of marine science, university of mazandaran, babolsar, iran. farzaneh mirzapour faculty of marine science, university of mazandaran, babolsar, iran. shila omidzahir faculty of marine science, university of mazandaran, babolsar, iran. maryam akhoundian faculty of marine science, university of mazandaran, babolsar, iran.

heavy metal accumulation in the aquatic ecosystems is a main concern which threats human health. in this study two commercial fish species, rutilus kutum and chelon aurata were selected for assessing heavy metal (cd, pb, zn) concentrations in gill and liver tissues at babolsar’s coast, the southern caspian sea, iran. babolsar is one of the important fishery stations in the southern caspian sea....

2007
Unnati Thakore Lorie M. Liebrock

The grid security architecture today does not prevent certain unauthorized access to the files associated with a job executing on a remote machine. Programs and data are transferred to a remote machine for completing staging jobs. Footprints may remain on the machine after the programs and data are deleted from the remote machine. Anyone with super user privileges can access these footprints. I...

2014
Rajendra Sharma

In recent wireless communication has become more popular because of its flexibility. That is, there is no need of large and complex physical establishment; one can connect with it easily using radio waves. But on the other part it also increases the chance for the unauthorized users to misuse it as there are fewer burdens in connectivity as compared to wired communications. The unauthorized acc...

1994
Jack Brassil Steven H. Low Nicholas F. Maxemchuk Lawrence O'Gorman

Modern computer networks make it possible to distribute documents quickly and economically by electronic means rather than by conventional paper means. However, the widespread adoption of electronic distribution of copyrighted material is currently impeded by the ease of unauthorized copying and dissemination. In this paper we propose techniques that discourage unauthorized distribution by embe...

2004
Hyuncheol Kim Sunghae Kim Seong-Jin Ahn Jin-Wook Chung

Currently, the major focus on the network security is securing individual components as well as preventing unauthorized access to network services. Ironically, Address Resolution Protocol (ARP) poisoning and spoofing techniques can be used to prohibit unauthorized network access and resource modifications. The protecting ARP which relies on hosts caching reply messages can be the primary method...

1994
Li Gong Nachum Shacham

Multicast is rapidly becoming an important mode of communication as well as a good platform for building group-oriented services. However, to be used for trusted communication, current multicast schemes must be supplemented by mechanisms for protecting traac, controlling participation, and restricting access of unauthorized users to the data exchanged by the participants. In this paper, we cons...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید