نتایج جستجو برای: denial of critical idea
تعداد نتایج: 21198708 فیلتر نتایج به سال:
As an increasing number of businesses and services depend on the Internet, protecting them against DDoS (Distributed Denial of Service) attacks becomes a critical issue. A traceback is used to discover technical information concerning the ingress points, paths, partial paths or sources of a packet or packets causing a problematic network event. The traceback mechanism is a useful tool to identi...
These days the problem of cyber security is of utmost importance. Massive cyber attacks targeting government and mission critical servers can swiftly become an issue of national security. Various approaches for cyber defence and cyber security used to date have been based on software solutions without hardware acceleration. With the increasing number of network users, services and the current g...
The Latin American dependentistas produced a knowledge that criticized the Eurocentric assumptions of the cepalistas, including theorthodoxMarxist and theNorthAmericanmodernization theories. The dependentista school critique of stagism and developmentalism was an important intervention that transformed the imaginary of intellectual debates in many parts of the world. However, I will argue that ...
The Bluetooth wireless technology realizes a low-cost shortrange wireless voiceand data-connection through radio propagation. Bluetooth also has a security architecture. In this paper, we focus on the key agreement protocol, which is the most critical part of this security architecture. Several security flaws have been identified within the Bluetooth protocols: an attacker can track users by mo...
The purpose of this study was to predict the sexual satisfaction of married women based on marital adjustment, communication patterns, and emotional regulation. The present research is descriptive-correlational. The statistical population of the study consisted of all married women aged 25 to 50 years in the field of psychology and education at the Azad University of Science and Research Branch...
Increasingly sophisticated computer software is being utilized to support detailed critical path method (CPM) analysis for resolving delay and disruption claims. The accurate determination of entitlement is however still dependent on the quality of programme and progress information provided by all parties. A comparative analysis of record-keeping methods in the UK and the US reveals that there...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید