نتایج جستجو برای: penetration test mini

تعداد نتایج: 871388  

Journal: :Journal of the Japanese Association for Petroleum Technology 1958

1999

According to literature, penetration pricing is the dominant pricing strategy for network effect markets. In this paper we show that diffusion of products in a network effect market does not only vary with the set of pricing strategies chosen by competing vendors but also strongly depends on the topological structure of the customers' network. This stresses the inappropriateness of classical "i...

Journal: :JDCTA 2010
Ming-Hour Yang

To diagnose the vulnerabilities of target system using a remote penetration test approach needs to avoid the modification of the security configuration of the target network. So the carrier of test codes needs to hide from the IDS filter out of our penetrating test codes. Hence, we proposed a polymorphic carrier which carries encrypted test codes and diversified decrypters, and, the proposed ca...

2015
Bangaly Kaba

Africa needs access to the powerful information and communication tools of the internet in order to obtain the resources and efficiency essential for its sustainable development. Unfortunately, in 2014, the data from internetlivestats.com showed only 9.8% of African populations have access to the internet. This relative low internet penetration rate signals a problem that may threaten the econo...

2006
Martin Mössner Dieter Heinrich Kurt Schindelwig Peter Kaps Peter Lugner Heinz-Bodo Schmiedmayer Herwig Schretter Werner Nachbauer

Carved turns with alpine skis are investigated. During the movement of a ski, snow is loaded and unloaded. Compacted snow is not elastic, i.e. deformations remain. Such effects are modeled by a hypoplastic constitutive equation. During a turn the shovel digs into the snow and the tail maintains nearly the same penetration depth as the part under maximum load. This results in a higher resistance...

2007
Xin Yue Jijun Zhao Jieshan Qiu

Density functional theory calculations were performed to investigate the endohedral and exohedral adsorption of a H2 molecule on the classical and nonclassical fullerenes Cx (x=58, 59, 60, 62) with seven-, eight-, and ninemembered rings. The amplitude of adsorption energies are within 0.03eV and the molecule-fullerene interaction belongs to van der Waals type. Penetration of a H2 molecule throu...

Journal: :Computers & Security 2015
Francois Mouton Mercia M. Malan Kai Kimppa Hein S. Venter

Social engineering is deeply entrenched in the fields of both computer science and social psychology. Knowledge is required in both these disciplines to perform social engineering based research. Several ethical concerns and requirements need to be taken into account when social engineering research is conducted to ensure that harm does not befall those who participate in such research. These c...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید