Web
Education
Viewing 1-9 of 9 total results
Future Developments in Non-Repudiation in GSM WAP ...
Journal of Mobile, Embedded and Distributed Systems, vol. I, no. 1, 2009 ISSN 2067 – 4074 Page 23 Fig. 2. GSM Mobile Equipment Structure The GSM evolution is based on this infrastructure and the security of the entire system depends on many factors. 2. GSM Voice and Data Security
Facial Recognition using OpenCV - Semantic Scholar
Journal of Mobile, Embedded and Distributed Systems, vol. IV, no. 1, 2012 ISSN 2067 – 4074 39 is processed to crop and extract the person’s face for easier recognition. Face Recognition where that detected and processed face is compared to a database of known faces, to decide who that person is. Since 2002, face detection can be
Issues in WiFi Networks - 123seminarsonly.com
Journal of Mobile, Embedded and Distributed Systems, vol. I, no. 1, 2009 ISSN 2067 – 4074 Key Page 7 If the device sends a encrypted packet over WiFi using WEP in IEEE 802.11 secure architecture then the user insert a symmetric encryption key (the same as the one from
Single Page Web Applications Security
Journal of Mobile, Embedded and Distributed Systems, vol. VII, no. 2, 2015 ISSN 2067 – 4074 57 Social engineering is another way to gather sensitive information from users but it relies entirely on user weaknesses. One important principle in keeping sensitive data secure is avoid keeping it. Sensitive data should be kept only if it is
Database Versioning 2.0, a Transparent SQL Approach Used ...
References [1] Cosmin Cioranu, Marius Cioca, Database Versioning, a Transparent SQL Approach, Journal of Mobile, Embedded and Distributed Systems; vol. V, no. 1, 2013, ISSN 2067-4074. [2] Filip F.G., A decision-making perspective for designing and building information systems, International Journal of Computers Communications and Control, 7(2 ...
Methods and Techniques of Quality Management for ICT Audit ...
Journal of Mobile, Embedded and Distributed Systems, vol. III, no. 3, 2011 ISSN 2067 – 4074 103 External quality – aims to meet customer expectations for a product or service; Internal quality – corresponds to the improvement of the organization’s internal operations; its beneficiaries are management and employees.
Legal and Practical Aspects in the Computer Science ...
Journal of Mobile, Embedded and Distributed Systems, vol. III, no. 2, 2011 ISSN 2067 – 4074 In order to be able to demonstrate in front of the court the fact that the data present on the investigated storing device are identical to the ones in the image created by EnCase, a hash of these can be carried out in order for the results to be compared.
Information Security Standards - Semantic Scholar
Journal of Mobile, Embedded and Distributed Systems, vol. III, no. 3, 2011 ISSN 2067 – 4074 129 interchangeability - and at an economical cost. We need information security standards in order to implement information security controls to meet an organizations requirements as well as a set of controls
Binary Code Disassembly for Reverse Engineering
Journal of Mobile, Embedded and Distributed Systems, vol. IV, no. 4, 2012 ISSN 2067 – 4074 235 Figure 3. Disassembled code of the COM file in td.exe After the assembly instruction int 21h, the next 6 bytes are used to store data in the COM file. The application td.exe considers the 6 bytes as operation codes for binary
|
iSEEK provides users with a Favorites library that allows them easy access to their most-used websites from any computer. If you have an iSEEK account, the content you just selected can be added to your Favorites page to be revisited any time you want.
If you would like to join the iSEEK community, click the "Register" button below to create your free iSEEK account. The resource you have selected will be added to your new Favorites library after you sign in for the first time.
If you already have an iSEEK account, click the button below to sign in and add the resource to your Favorites library.