نتایج جستجو برای: authorized access
تعداد نتایج: 331905 فیلتر نتایج به سال:
This Thesis is brought to you for free and open access by the Theses and Dissertations at Loyola eCommons. It has been accepted for inclusion in Master's Theses by an authorized administrator of Loyola eCommons. For more information, please contact [email protected].
This Book Review is brought to you for free and open access by the Anthropology at Scholar Commons. It has been accepted for inclusion in Journal of Ecological Anthropology by an authorized editor of Scholar Commons. For more information, please contact [email protected]. Recommended Citation Joseph, Suzanne. "Hierarchy Theory: A Vision, Vocabulary, and Epistemology." Journal of Ecological...
This Lecture is brought to you for free and open access by the Valparaiso University Law School at ValpoScholar. It has been accepted for inclusion in Valparaiso University Law Review by an authorized administrator of ValpoScholar. For more information, please contact a ValpoScholar staff member at [email protected].
This Book Review is brought to you for free and open access by the Anthropology at Scholar Commons. It has been accepted for inclusion in Journal of Ecological Anthropology by an authorized editor of Scholar Commons. For more information, please contact [email protected]. Recommended Citation Kemper, Rudo. "Qualitative GIS: A Mixed Methods Approach." Journal of Ecological Anthropology 17, ...
This Thesis is brought to you for free and open access by the Theses and Dissertations at Loyola eCommons. It has been accepted for inclusion in Master's Theses by an authorized administrator of Loyola eCommons. For more information, please contact [email protected].
This Thesis is brought to you for free and open access by the Theses and Dissertations at Loyola eCommons. It has been accepted for inclusion in Master's Theses by an authorized administrator of Loyola eCommons. For more information, please contact [email protected].
This Thesis is brought to you for free and open access by the Theses and Dissertations at Loyola eCommons. It has been accepted for inclusion in Master's Theses by an authorized administrator of Loyola eCommons. For more information, please contact [email protected].
Secure computing has been an issue of high concern since the beginning of shared computers. As computers became more prevalent, so did resources shared between different users of computer systems, and naturally, users came to want to limit the access of other users to their own resources. To this end, many access control mechanisms have been devised whose general purpose are to allow access to ...
In order to solve the problem of unwanted access to systems, we proposed a Text Dependent Speaker Identification System that uses two features to keep out intruders. If a user wanted to gain access, both the userÕs voice and his/her personal password will need to be recognized and authenticated by the security system. Even if an unauthorized user could obtain a sample of an authorized userÕs vo...
With the advent of Cloud Computing, data are increasingly being stored and processed by untrusted third-party servers on the Internet. Since the data owner lacks direct control over the hardware and the software running at the server, there is a need to ensure that the data are not read or modified by unauthorized entities. Even though a simple encryption of the data before transferring it to t...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید