Internet security applications of the Munn rings

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

factor influencing the adoption of internet banking

دوره مشترک کارشناسی ارشد بازاریابی و تجارت الکترونیک دانشگاه تربیت مدرس_ دانشگاه تکنولوژی lule? چکیده پایان نامه عوامل موثر بر پذیرش اینترنت بانک توسط مشتریان پیشرفت فناوری اطلاعات و ارتباطات و به طور خاص رشد اینترنت جهت تراکنش های معاملات بازرگانی، تاثیر بسیار عمیقی در صنعت بانکداری داشته است.این در حالی ست که نفوذ بانکداری اینترنتی در کشورهای در حال توسعه بسیار کندتر از نفوذ آن ...

15 صفحه اول

Mobile Security for Internet Applications ∗

The WebSIM is a technology for interfacing GSM SIMs with the Internet, by implementing a Web server inside a SIM. This paper discusses how this technology can be used for securing services over the Internet and describes several concrete application scenarios.

متن کامل

internet security

generally, this article deals with the challenges and solutions facing the internet security. first, the article discusses the following subjects: the security of communication and information networks, the importance of the networks, the networks security precedence internet and computers crimes, the beginning of computer crimes, classifying computer crimes as well as the solutions proposed to...

متن کامل

Ensemble Pruning of Internet Traffic Classifiers for Security Applications

Internet Traffic classification is vital for various network activities such as detection of malware. Security is major issue of concern which accounts for the reputation and reliability of system. Malware effects the system adversely results in data loss or abnormal functioning. Hence, detection and as well as removal of malware is crucial. Combining set of classifiers called as ensembling pro...

متن کامل

A Parametric Approach for Security Testing of Internet Applications

Security is one of the prime concerns for all the Internet applications. Often it is noticed that during testing of the application, security doesn’t get due focus and whatever security testing is done, it is mainly limited to security functionality testing as captured in the requirements document. Any mistake at requirement gathering stage can leave the application vulnerable to potential atta...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Semigroup Forum

سال: 2010

ISSN: 0037-1912,1432-2137

DOI: 10.1007/s00233-010-9242-1