搜索资源列表
cm_zfzwkjk
- 直放站设备网管接口要求 直放站设备网管接口要求包括接口功能要求、数据需求和性能要求等部分。 直放站网管接口满足对直放站设备的配置管理、数据的实时采集和故障告警管理几项功能要求。 网管接口在满足功能要求的同时须满足稳定性、及时性、完整性、准确性及安全性等相关技术要求。 -Repeater equipment network management interface requirements Repeater equipment requirements, including net
virtualizationsecurity
- 虚拟化安全综述——虚拟化是数据中心的流行技术,它起源于20世纪60年代。它是把昂贵的计算机资源的利用最大化的方式。典型的服务器运行至少40 利用率,虚拟化可以更有效地利用技术资源,并节约固定费用。虚拟化的最大优势是,它允许管理员从中央区域为个人电脑和客户设备提供软件。虚拟化不需要管理员对一般任务进行分别考虑。服务器的关机可以带动多用户的关机。-Virtualization Security Review- virtualization is a popular data center techn
A-Taxonomy-and-Adversarial-Model-for
- In recent years, it has become important for researchers, security incident responders and educators to share network logs, and many log anonymization tools and techniques have been put forth to sanitize this sensitive data source in order to
fsdfsdfd
- 服务商解释说,对云计算过程里的数据安全问题,“完全不必担心”。-Service provider explained that the process of cloud computing in the data security problem, " do not have to worry about."
bsfdes
- 计算的主要推动者,发布Blue Cloud计划的IBM公司还表示,在2008年,会制定更多的相关流程与标准来保证客户的数据安全。-Calculate the main promoters, release of IBM' s Blue Cloud program also said that in 2008, will develop a more relevant processes and standards to ensure customer data security.
1682_952_final-thesis
- The amount of Implantable Medical Devices (IMD) keeps booming in recent years. However, not many of them have encryption and decryption methods to protect their data communication. The purpose of this thesis work is to profile various popular
Data-Storage-Security-in-Cloud-Computing
- Data security in cloud computing
OPNET-of-the-router-capability
- 本文在阐述网络发展的现状和趋势的基础上,着重分析了两种内 部网关路由选择协议砒P和OSPF协议的实现机制和性能特点。对P 协议是基于距离矢量算法的。OSPF协议是基于链路状态算法的。本 文的工作重点是对上述两种协议分别从类型,封装,路径特征,邻居 发现和支持,路由选择数据的分发,对变化的响应,路由表计算,健 壮性/可靠性以及安全性等方面进行了对比分析,并对它们存在的安 全漏洞进行了初步的分析说明。根据以上的分析,通过On忸T软件, 本文设计了一个10km×10km规模
58285522-SCTP-Technical-Tutorial
- Next Generation Networks TCP – Transmission Control Protocol SCTP – Stream ControlUser Adaptation Layers for SCTP Transmission Protocol SCTP Packets Establishing the Connection (Association) Data Transmission Closing the Connection (Assoc
HP-Arcsight-platform
- 国内主要安全厂商的SIEM产品,原型基本上都来源于Arcsight,较业内竞争对手相比,Arcisght至少在下面三个方面具有绝对的优势:第一大优势:强大高效的日志采集功能 第二大优势:无与伦比的强大的关联分析功能 第三大优势:灵活的数据挖掘、检索、分析和报表管理功能.-Major domestic security vendors SIEM products, prototypes are basically derived from Arcsight, compared with the i
RTQP-sig-alternate-v2
- Wireless Sensor Networks (WSN) have recently been in the limelight for many domains. WSN are useful in data collection, event detection or entity tracking applications. The characteristics of sensor networks have imposed various restrictions on their
EFFECTIVENESS-OF-SUPPORT-VECTOR-MACHINE-FOR-CRIME
- Crime hot-spot location prediction is important for public safety. The output from the prediction can provide useful information to improve the activities aimed at detecting and preventing safety and security problems. Location prediction is a sp
Guideline-for-Computer-Security
- Cell phones and personal digital assistants (PDAs) have become indispensable tools for today s highly mobile workforce. Small and relatively inexpensive, these devices can be used for many functions, including sending and receiving electronic mail, s
Auditing-mechanism
- Cloud computing is the one which offers infrastructure to the client on a pay as you use model by leveraging on the Internet technology. As this model depicts the electricity billing it is often termed as utility computing. As the use of cloud increa
1111.3165
- Cloud computing is an Internet-based computing, where shared resources, software and information, are provided to computers and devices on-demand. It provides people the way to share distributed resources and services that belong to different
Network-Security-Strategy-in-Bigdata
- 收藏的关于大数据时代的网络安全策略的论文,和大家一同分享。-The article firstly overviewed “Big Data Research and Development Initiative” announced recently by the U.S. federal government a perspective of big data-based information network security development, especially an
RFID
- RFID(无线射频识别)技术也被称为电子标签技术,它通过无线射频信号实现非接触方式下的双向通信,完成对目标对象的自动识别和数据的读写操作。 RFID技术具有无接触、精度高、抗干扰、速度快以及适应环境能力强等显著优点,可广泛应用于诸如物流管理、交通运输、医疗卫生、商品防伪、资产管理以及国防军事等领域,被公认为二十一世纪十大重要技术之一。 -RFID (Radio Frequency Identification) technique is also known as RFID tec
security-key
- Multi-carrier modulation (MCM) is a method of transmitting data by splitting it into several components, and sending each of these components over separate carrier signals
Enhanced-Data-Security-Model-for-Cloud-Computing-
- Enhanced Data Security Model for Cloud Computing Platform, Research paper