Web
Education
Viewing 1-8 of 8 total results
(PDF) Project Management with IT Security Focus
Project Management with IT Security Focus. Article (PDF Available) · December 2011 ... Journal of Mobile, Embedded and Distributed Systems, vol. III, no. 4, 2011. ISSN 2067 ...
Issues in WiFi Networks - 123seminarsonly.com
Journal of Mobile, Embedded and Distributed Systems, vol. I, no. 1, 2009 ISSN 2067 – 4074 Key Page 7 If the device sends a encrypted packet over WiFi using WEP in IEEE 802.11 secure architecture then the user insert a symmetric encryption key (the same as the one from
Page:Approaches on Internet of Things Solutions.pdf/1 ...
Journal of Mobile, Embedded and Distributed Systems, vol. V, no. 3, 2013 ISSN 2067 – 4074 www.jmeds.eu Approaches on Internet of Things Solutions Cristian TOMA, Cristian CIUREA, Ion IVAN
Hiding Malicious Content in PDF Documents
Journal of Mobile, Embedded and Distributed Systems, vol. III, no. 3, 2011 ISSN 2067 – 4074 121 other file format. This will not invalidate the digital signature, as no bits of the actual file were altered. This met hod is known as the Dali Attack, named after the famous painter [4], [5]. The first demonstration of the attack was
Methods and Techniques of Quality Management for ICT Audit ...
Journal of Mobile, Embedded and Distributed Systems, vol. III, no. 3, 2011 ISSN 2067 – 4074 103 External quality – aims to meet customer expectations for a product or service; Internal quality – corresponds to the improvement of the organization’s internal operations; its beneficiaries are management and employees.
Legal and Practical Aspects in the Computer Science ...
Journal of Mobile, Embedded and Distributed Systems, vol. III, no. 2, 2011 ISSN 2067 – 4074 In order to be able to demonstrate in front of the court the fact that the data present on the investigated storing device are identical to the ones in the image created by EnCase, a hash of these can be carried out in order for the results to be compared.
Information Security Standards - Semantic Scholar
Journal of Mobile, Embedded and Distributed Systems, vol. III, no. 3, 2011 ISSN 2067 – 4074 129 interchangeability - and at an economical cost. We need information security standards in order to implement information security controls to meet an organizations requirements as well as a set of controls
Facial Recognition using OpenCV - Semantic Scholar
Journal of Mobile, Embedded and Distributed Systems, vol. IV, no. 1, 2012 ISSN 2067 – 4074 39 is processed to crop and extract the person’s face for easier recognition. Face Recognition where that detected and processed face is compared to a database of known faces, to decide who that person is. Since 2002, face detection can be
|
iSEEK provides users with a Favorites library that allows them easy access to their most-used websites from any computer. If you have an iSEEK account, the content you just selected can be added to your Favorites page to be revisited any time you want.
If you would like to join the iSEEK community, click the "Register" button below to create your free iSEEK account. The resource you have selected will be added to your new Favorites library after you sign in for the first time.
If you already have an iSEEK account, click the button below to sign in and add the resource to your Favorites library.