نتایج جستجو برای: unauthorized tissues
تعداد نتایج: 198978 فیلتر نتایج به سال:
In recent years database security has become one of the major issues in computer security. Database security is concerned with preventing unauthorized and malicious access into a database. A number of mechanisms needed to defend information, such as verification, user privileges, data encryption, and auditing, are available in DBMS. In reality, malicious access of databases by unauthorized user...
Digital photos are very popular on the Internet; unfortunately, unauthorized distribution and use of these photos is very common. To prevent unauthorized use, an author can place a watermark on the image, but this technology has not been implemented in an embedded system. Without an instant watermark and encryption option on digital cameras and e-albums, the user must manipulate online photos w...
Both reproductive medicine and genetics are seeing rapid, and in some instances revolutionary, medical and scientific advances. Courtshavebeencailedupontoresolveavariety of novel disputes arising from these areas, and more can be anticipated as these technologies continue to develop and their use becomes more widespread. This article discusses some of the most relevant areas of the law and liti...
In recent times, communication through the internet has tremendously facilitated the distribution of multimedia data. Although this is indubitably a boon, one of its repercussions is that it has also given impetus to the notorious issue of online music piracy. Unethical attempts can also be made to deliberately alter such copyrighted data and thus, misuse it. Copyright violation by means of una...
The Hypertext Transfer Protocol (HTTP) is an application protocol for distributed, collaborative, hypermedia information systems. HTTP is the foundation of data communication for the World Wide Web. HTTP is not only used for communication purpose, it is also used for file/data transfer, chatting, etc. The HTTPS protocol to guarantee privacy and security in transactions ranging from home banking...
Inbuilt physical security in wireless networks is not obtainable and unfortunately these are more prone to attacks from intruders. Resources are easily accessible, once an unauthorized access is gained. Paper elucidates numerous attacks which an intruder could use to detect and connect to the wireless network. Focus of the paper is on two technologies Wired Equivalent Privacy (WEP) and IEEE 802...
In this article we examine whether the proposal to criminalize illegal stay in the Netherlands was preceded by increased negative media attention for unauthorized immigrants. Using a corpus linguistics approach, we carried out a quantitative discourse analysis of all newspaper articles on unauthorized migrants over a period of 15 years. Our results show that the amount of media coverage actuall...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید