Guides to administrator behavior

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Collicular Vision Guides Nonconscious Behavior

Following destruction or deafferentation of primary visual cortex (area V1, striate cortex), clinical blindness ensues, but residual visual functions may, nevertheless, persist without perceptual consciousness (a condition termed blindsight). The study of patients with such lesions thus offers a unique opportunity to investigate what visual capacities are mediated by the extrastriate pathways t...

متن کامل

Exploitation of Server Log Files of User Behavior in Order to Inform Administrator

Requests that users are sent to the Web server all in server log files are stored in a file called. It can be stated that users will see all pages or all user requests to the server, the file is stored. In this paper we investigate the behavior of users through web usage mining techniques and using server log files to help service administrators paid websites. At the end a web site downloading ...

متن کامل

Tourists responses to mobile augmented reality travel guides: The role of emotions on adoption behavior

This research presents a mobile augmented reality (MAR) travel guide, named CorfuAR, which supports personalized recommendations. We report the development process and devise a theoretical model that explores the adoption of MAR applications through their emotional impact. A field study on Corfu visitors (n=105) shows that the functional properties of CorfuAR evoke feelings of pleasure and arou...

متن کامل

An Eye on Network Intruder-Administrator Shootouts

Carefully logging network activity is essential to meet the requirements of high security and optimal resource availability. However, detecting break-in attempts within this activity is a difficult task. Making the distinction between misuse and normal use is hard, and identifying intrusions that use novel attacks is fundamentally difficult. In this paper, we introduce a visual approach for ana...

متن کامل

Single Sign-On and the System Administrator

Large organizations are increasingly shifting critical computing operations from traditional host-based application platforms to network-distributed, client-server platforms. The resulting proliferation of disparate systems poses problems for end-users, who must frequently track multiple electronic identities across different systems, as well as for system administrators, who must manage securi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Educational Considerations

سال: 1977

ISSN: 0146-9282

DOI: 10.4148/0146-9282.2010