Internet security applications of the Munn rings
نویسندگان
چکیده
منابع مشابه
factor influencing the adoption of internet banking
دوره مشترک کارشناسی ارشد بازاریابی و تجارت الکترونیک دانشگاه تربیت مدرس_ دانشگاه تکنولوژی lule? چکیده پایان نامه عوامل موثر بر پذیرش اینترنت بانک توسط مشتریان پیشرفت فناوری اطلاعات و ارتباطات و به طور خاص رشد اینترنت جهت تراکنش های معاملات بازرگانی، تاثیر بسیار عمیقی در صنعت بانکداری داشته است.این در حالی ست که نفوذ بانکداری اینترنتی در کشورهای در حال توسعه بسیار کندتر از نفوذ آن ...
15 صفحه اولMobile Security for Internet Applications ∗
The WebSIM is a technology for interfacing GSM SIMs with the Internet, by implementing a Web server inside a SIM. This paper discusses how this technology can be used for securing services over the Internet and describes several concrete application scenarios.
متن کاملinternet security
generally, this article deals with the challenges and solutions facing the internet security. first, the article discusses the following subjects: the security of communication and information networks, the importance of the networks, the networks security precedence internet and computers crimes, the beginning of computer crimes, classifying computer crimes as well as the solutions proposed to...
متن کاملEnsemble Pruning of Internet Traffic Classifiers for Security Applications
Internet Traffic classification is vital for various network activities such as detection of malware. Security is major issue of concern which accounts for the reputation and reliability of system. Malware effects the system adversely results in data loss or abnormal functioning. Hence, detection and as well as removal of malware is crucial. Combining set of classifiers called as ensembling pro...
متن کاملA Parametric Approach for Security Testing of Internet Applications
Security is one of the prime concerns for all the Internet applications. Often it is noticed that during testing of the application, security doesn’t get due focus and whatever security testing is done, it is mainly limited to security functionality testing as captured in the requirements document. Any mistake at requirement gathering stage can leave the application vulnerable to potential atta...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Semigroup Forum
سال: 2010
ISSN: 0037-1912,1432-2137
DOI: 10.1007/s00233-010-9242-1