نتایج جستجو برای: penetration test
تعداد نتایج: 843790 فیلتر نتایج به سال:
Security researchers and practitioners lack techniques to quantitatively evaluate the strength of security systems against a determined attacker. Currently, evaluation is either qualitative, such as through security certification standards, or ad-hoc, such as through penetration testing and auditing. In this paper, we propose a framework that if applied to security systems, would produce quanti...
We study the lags with which new technologies are adopted across countries, and their penetration rates once they are adopted. Using data from the last two centuries, we estimate both the extensive and the intensive margins of technology adoption. We document two new facts: there has been convergence in adoption lags between rich and poor countries, while there has been divergence in penetratio...
Pentesting is becoming an important activity even for smaller companies. One of the most important economic pressures is the cost of such tests. In order to automate pentests, tools such as Metasploit can be used. Post-exploitation activities can, however, not be automated easily. Our contribution is to extend Meterpreter-scripts so that postexploitation can be scripted. Moreover, using a multi...
When connected in small amounts, the impact of distributed generation (DG) on distribution system stability will be negligible. However, if its penetration level becomes higher, distributed generation may start to influence the dynamic behavior of the system as a whole. This paper presents a mathematical representation of a solid oxide fuel cell plant that is suitable for use in distribution sy...
It sounds good when knowing the penetration testers open source toolkit in this website. This is one of the books that many people looking for. In the past, many people ask about this book as their favourite book to read and collect. And now, we present hat you need quickly. It seems to be so happy to offer you this famous book. It will not become a unity of the way for you to get amazing benef...
T paper develops a framework for measuring “tipping”—the increase in a firm’s market share dominance caused by indirect network effects. Our measure compares the expected concentration in a market to the hypothetical expected concentration that would arise in the absence of indirect network effects. In practice, this measure requires a model that can predict the counterfactual market concentrat...
This paper examines strategies of standard software vendors, in view of the existence of network effects on standard software markets. In particular, we analyze if and under which conditions penetration pricing can be considered as a promising strategy. Our work is based on a simulation model, which provides the opportunity to examine the impact of alternative pricing strategies on the distribu...
Conventional drilling of rock, in most mining applications, uses the mechanical impact of a metal tool to create the advancing hole. This technique, which has gradually increased in power and thus penetration rate has, however, certain inherent disadvantages. These range from the overall weight of the equipment which must be located at the free face of the hole to the maintenance of alignment o...
In this study, we explore the global effect of the Internet on democracy over the period of 1992 to 2002 by observing the relationships between measures related to democracy and Internet prevalence. Our findings suggest that while Internet usage was not a very powerful predictor of democracy when examining full panel data from 1992 to 2002, it was a stronger predictor when we study data from ju...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید