Top Message
Top Message
Back to Home Page  |  Settings   |  Sign In
Web Education
Viewing 1-3 of 3 total results
Journal of Mobile, Embedded and Distributed Systems - JMEDS
Rootkits are considered by many to be one of the most stealthy computer malware (malicious software) and pose significant threats. Hiding their presence and activities impose hijacking the control flow by altering data structures, or by using hooks in the kernel.
 Information Security Standards - Semantic Scholar
Journal of Mobile, Embedded and Distributed Systems, vol. III, no. 3, 2011 ISSN 2067 – 4074 129 interchangeability - and at an economical cost. We need information security standards in order to implement information security controls to meet an organizations requirements as well as a set of controls
Concurrency Control Techniques | Distributed Computing ...
Concurrency Control Techniques - Free download as Powerpoint Presentation (.ppt), PDF File (.pdf), Text File (.txt) or view presentation slides online. concurrency control techniques in dbms