Top Message
Top Message
Back to Home Page  |  Settings   |  Sign In
Web Education
1 2 3 4 5
Pages
|
Viewing 21-30 of 50 total results
Freelance translator for IT content, English to German ...
Freelance translator and localizer English to German for IT companies. I translate your web sites, content marketing, customer communications, etc. Computing graduate with an additional degree in English and 20 years of translation experience.
https://www.proz.com/translator/125774
Average Rating (0 votes)
Future Developments in Non-Repudiation in GSM WAP ...
Journal of Mobile, Embedded and Distributed Systems, vol. I, no. 1, 2009 ISSN 2067 – 4074 Page 23 Fig. 2. GSM Mobile Equipment Structure The GSM evolution is based on this infrastructure and the security of the entire system depends on many factors. 2. GSM Voice and Data Security
An Adaptive Authorization Model Based on RBAC - CORE
Publisher: Journal of Mobile, Embedded and Distributed Systems. Year: 2009. OAI identifier: oai:ojs.jmeds.eu:article/12 Provided by: Journal of Mobile, Embedded and Distributed Systems (Bucharest Academy of Economic Studies) Downloaded from ...
https://core.ac.uk/display/233566967
Average Rating (0 votes)
Database Versioning 2.0, a Transparent SQL Approach Used ...
References [1] Cosmin Cioranu, Marius Cioca, Database Versioning, a Transparent SQL Approach, Journal of Mobile, Embedded and Distributed Systems; vol. V, no. 1, 2013, ISSN 2067-4074. [2] Filip F.G., A decision-making perspective for designing and building information systems, International Journal of Computers Communications and Control, 7(2 ...
Ciprian STANICA-EZEANU - Information Security Officer ...
Journal of Mobile, Embedded and Distributed Systems - JMEDS [Vol.1, No.2 (2009) - ISSN: 2067-4074] 2009. The aim of this paper is to present e-voting procedure describing its advantages and disadvantages. Conventional security measures such as firewalls or SSL communications are necessary but not sufficient to guarantee the specific security ...
https://ro.linkedin.com/in/cystanica
Average Rating (0 votes)
Assessment of Secure OpenID-Based DAAA Protocol for ...
It is increasingly difficult to manage the user identities (IDs) of rapidly developing and numerous types of online web-based applications in the present era. An innovative ID management system is required for managing the user IDs. The OpenID lightweight protocol is a better solution to manage the user IDs. In an OpenID communication environment, OpenID URL is not secured in a session ...
IE-ASE 2014 : The 13th International Conference on ...
Journal of Mobile, Embedded and Distributed Systems (JMEDS) - www.jmeds.eu International Journal of Economic Practices and Theories (IJEPT) - www.ijept.org and will be indexed by major databases: ISI Thomson Reuters Services Directory of Open Access Journal Cabell’s Directories of Publishing Opportunities EBSCO (Business Source Complete) ICAAP
Are You Really Influencing Your Customers?: A Black-Friday ...
The concept of Black Friday appeared more than 50 years ago and is known as an American holiday retail and in time it has crossed the borders of US and was been widely adopted by other countries from...
Academia de Studii Economice (Romania) [WorldCat Identities]
Journal of mobile, embedded and distributed systems ( ) in English and held by 208 WorldCat member libraries worldwide Publishes the latest results of research and developed solutions in the field of mobile, embedded and distributed systems. Informatica economica ...
Lock Out Tag Out Procedures | Electrical Components ...
Journal of Mobile, Embedded and Distributed Systems (JMEDS) Proposed Effective Solution for Cybercrime Investigation in Myanmar. Uploaded by. theijes. Lab NAT PAT (1) Uploaded by. Quoc Nguyen Anh. Transformation to Cloud Services Sourcing - Required IT Governance Capabilities. Uploaded by. mmark_kramm. 290768_EN. Uploaded by.
1 2 3 4 5
Pages
|