نتایج جستجو برای: unauthorized tissues
تعداد نتایج: 198978 فیلتر نتایج به سال:
Revised June 1, 1998 Page 1 of 15 Preventing unauthorized access to sensitive data is essential in environments in which multiple users have access to the same physical or network resources. Operating systems (OSs) and individual users must be able to protect files, memory, and configuration settings from unauthorized viewing and modification. OS security includes obvious mechanisms such as acc...
Security and Privacy concerns in Radio frequency identification (RFID) technology particularly RFID Card, is a wide research area which have attracted researchers for over a decade. Authenticating users at the Card end of the RFID technology constitutes one of the major sources of attacks on the system. In this research, we studied the various known attacks and mitigation available. We proposed...
bronchiolo-alveolar carcinoma with subcutaneous chest wall metastasis is a very rare presentation. a case of 36- year-old male with metastatic subcutaneous chest nodule of bronchiolo-alveolar carcinoma, diagnosed by fine needle aspiration cytology, is reported here. cutaneous metastases are of diagnostic importance because they may be the first manifestation of an undiscovered internal malignan...
objective: the lrr (leucine rich proteoglycans) is a molecular recognition motif found in proteins with some roles in cell adhesion, signal transduction, dna repair and rna processing. opticin is a member of this family. takanosu et al (2001) detected messenger rna expression of mouse opticin in the eye, heart, brain, testis, thyroid and epididymis by dot blot hybridization. in this study, exp...
heavy metal accumulation in the aquatic ecosystems is a main concern which threats human health. in this study two commercial fish species, rutilus kutum and chelon aurata were selected for assessing heavy metal (cd, pb, zn) concentrations in gill and liver tissues at babolsar’s coast, the southern caspian sea, iran. babolsar is one of the important fishery stations in the southern caspian sea....
The grid security architecture today does not prevent certain unauthorized access to the files associated with a job executing on a remote machine. Programs and data are transferred to a remote machine for completing staging jobs. Footprints may remain on the machine after the programs and data are deleted from the remote machine. Anyone with super user privileges can access these footprints. I...
In recent wireless communication has become more popular because of its flexibility. That is, there is no need of large and complex physical establishment; one can connect with it easily using radio waves. But on the other part it also increases the chance for the unauthorized users to misuse it as there are fewer burdens in connectivity as compared to wired communications. The unauthorized acc...
Modern computer networks make it possible to distribute documents quickly and economically by electronic means rather than by conventional paper means. However, the widespread adoption of electronic distribution of copyrighted material is currently impeded by the ease of unauthorized copying and dissemination. In this paper we propose techniques that discourage unauthorized distribution by embe...
Currently, the major focus on the network security is securing individual components as well as preventing unauthorized access to network services. Ironically, Address Resolution Protocol (ARP) poisoning and spoofing techniques can be used to prohibit unauthorized network access and resource modifications. The protecting ARP which relies on hosts caching reply messages can be the primary method...
Multicast is rapidly becoming an important mode of communication as well as a good platform for building group-oriented services. However, to be used for trusted communication, current multicast schemes must be supplemented by mechanisms for protecting traac, controlling participation, and restricting access of unauthorized users to the data exchanged by the participants. In this paper, we cons...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید