Protecting Against Cold

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A rapid cold-hardening response protecting against cold shock injury in Drosophila melanogaster.

In studies of insect cold-hardiness, the supercooling point (SCP) is defined as the temperature at which spontaneous nucleation of body fluids occurs. Despite having an SCP of -20 degrees C, adults of Drosophila melanogaster did not survive exposure to -5 degrees C, which suggests that cold shock causes lethal injury that is not associated with freezing. If, however, flies were chilled at 5 deg...

متن کامل

Protecting Communications against Forgery

This paper is an introduction to cryptography. It covers secretkey message authentication codes, unpredictable random functions, public-key secret-sharing systems, and public-key signature systems.

متن کامل

Protecting Spreadsheets Against Fraud

Previous research on spreadsheet risks has predominantly focussed on errors inadvertently introduced by spreadsheet writers i.e. it focussed on the “end-user aspects” of spreadsheet development. When analyzing a faulty spreadsheet, one might not be able to determine whether a particular error (fault) has been made by mistake or with fraudulent intentions. However, the fences protecting against ...

متن کامل

Protecting against Predatory Practices

Software security represents a major concern as cyber attacks continue to grow in number and sophistication. One security-weakening factor is related to the standardized software ecosystem that facilitates the spread of malware in systems that share common vulnerabilities. In this overview article, the main concepts associated with diversity and software redundancy are described in the perspect...

متن کامل

Protecting against Predatory Practices

A major reason for security professionals not seeming able to protect fully against the rapidly changing threat environment and sophisticated attacks is that they often don’t have available the necessary application security data for detecting and responding to such increasingly stealthy attacks. Furthermore, easily generated application security data are generally not reported timely or accura...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Science

سال: 2010

ISSN: 0036-8075,1095-9203

DOI: 10.1126/science.329.5998.1442-a