منابع مشابه
The Case for Hardening of the Target *
Tobacco control efforts increased smoking abstinence up until 1990; however, in the mid-1990s, smoking prevalence rates and the U.S. per capita consumption leveled off and remained constant (CDC 1999b; Taylor 2001; see Chapter 8). Per capita consumption again declined in 1999 following the Master Settlement Agreement (MSA) and a subsequent increase in the cost of cigarettes. However, it is uncl...
متن کاملMFCs for Gas Control in Case Hardening Processes
Surface hardening is a high temperature process that creates hard surface alloy layers that improve a metal’s wear resistance. The technique has been used for many years, however, precise control of the surface alloy composition is difficult since accurate control of the gas chemistry is challenging in these processes, which in turn makes it difficult to control the composition of the surface a...
متن کاملTLS hardening
This document presents TLS and how to make it secure enough as of 2014 Spring. Of course all the information given here will rot with time. Protocols known as secure will be cracked and will be replaced with better versions. Fortunately we will see that there are ways to assess the current security of your setup, but this explains why you may have to read further from this document to get the u...
متن کاملHardening Fingerprinting by Context
Near-duplicate detection is not only an important pre and post processing task in Information Retrieval but also an effective spam-detection technique. Among different approaches to near-replica detection methods based on document signatures are particularly attractive due to their scalability to massive document collections and their ability to handle high throughput rates. Their weakness lies...
متن کاملHardening & FIPS 140
FIPS 140-2 does not presently have security requirements that cover software-hardening techniques. Software hardening is a method of transforming an executable and associated data into a form that does not easily permit reverse engineering or reconstruction, but that has the identical execution properties of the original software. With software hardening it is possible to embed secret data such...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Minutes of the Proceedings of the Institution of Civil Engineers
سال: 1839
ISSN: 1753-7843
DOI: 10.1680/imotp.1839.24824