首页 | 官方网站   微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 0 毫秒
1.
2.
3.
This article discusses common vulnerabilities associated with Unix networking and how attackers could exploit these vulnerabilities. Having identified a range of vulnerabilities it then details some of the configurations and countermeasures that can be used to secure a host against them.  相似文献   

4.
介绍了利用Sock机制,实现跨Unix和WindowsNT系统的远程过程调用方法,实现机制,并简介编程要点。  相似文献   

5.
6.
7.
评细介绍了使用Samba软件来实现UNIX和Windows互联的集成技术,这种自由软件可以非常容易地实现这两种操作系统的互联,简化网络的使用方法,功能丰富,明显地提高网络资源的利用率。  相似文献   

8.
倾跌试验有多种方法,为了方便快捷地选取适用而有效的方法,本文就如何根据产品的不同外形、不同结构、不同电气性能选用适当的倾跌试验方法进行了具体分析。以便我们在工作中更准确更有效地选用。  相似文献   

9.
Unix和Windows图形用户界面开发的比较研究   总被引:1,自引:0,他引:1  
朱雪峰  顾耀林 《计算机工程》2001,27(12):182-184
通过对Unix和Windows两种系统图形和户界面开发技术的比较,分析得出了典型GUI的体系结构和应用程序接口。在此基础上提出了GUI的3层开发策略,对GUI开发过程中的面向对象技术进行了分析,并对GUI的图形演示技术作了深入的探讨,给出了OpenGL在两种平台上的实现方法。  相似文献   

10.
Demystifying 3D ICs: the pros and cons of going vertical   总被引:7,自引:0,他引:7  
This article provides a practical introduction to the design trade-offs of the currently available 3D IC technology options. It begins with an overview of techniques, such as wire bonding, microbumps, through vias, and contactless interconnection, comparing them in terms of vertical density and practical limits to their use. We then present a high-level discussion of the pros and cons of 3D technologies, with an analysis relating the number of transistors on a chip to the vertical interconnect density using estimates based on Rent's rule. Next, we provide a more detailed design example of inductively coupled interconnects, with measured results of a system fabricated in a 0.35-/spl mu/m technology and an analysis of misalignment and crosstalk tolerances. Lastly, we present a case study of a fast Fourier transform (FFT) placed and routed in a 0.18-/spl mu/m through-via silicon-on-insulator (SOI) technology, comparing the 3D design to a traditional 2D approach in terms of wire length and critical-path delay.  相似文献   

11.
McMillan  K. 《Computer》2002,35(5):104-105
On 15 November 2001, the executive board of the International Committee for Information Technology Standards approved a new CD-based geographic information standard. Security experts consider this standard to be integral to homeland security because military facilities and commercial airports will use it in key functions such as site and environmental planning. Two weeks later, the INCITS executive board announced the formation of a new technical committee, MI, devoted to biometrics standards. In this case, standards professionals and other subject matter experts will directly support the US Patriot Act through their work. These two examples show how de jure standards work through a streamlined process that enables emerging technologies to solve urgent problems. They belie a popular notion that market-driven, relevant standards must come from consortia formed on the fly  相似文献   

12.
13.
This paper analyzes the evolution, present situation, and prospects for the Argentine software and information services (SIS) sector. Argentina has some advantages to exploit in order to make significant inroads in this sector. It has a relative abundance of well-educated people, a sizeable domestic market, and a cultural influence in Spanish-speaking Latin America. The currency devaluation of 2002 dramatically reduced costs measured in U.S. dollars. Nonetheless, SIS firms in Argentina have focused primarily on the domestic accountancy and management market, where they enjoy advantages derived from the specific requirements of the domestic regulations and their knowledge of the business culture and the needs of their local clients. This concentration in the domestic market has caused SIS firms to pay insufficient attention to some key issues for competitiveness in this sector. Hence, it is no surprise to find that they lack marketing and management capabilities and that the diffusion of quality certifications is almost null. The domestic environment also poses some obstacles, since firms often have difficulties accessing investment and working capital. Business networking mechanisms are weak, both among SIS firms as well as between them and their customers, R&D institutions, etc. Increasing the competitiveness of this sector requires intelligent public policies and actions aimed at improving the SIS firms' capabilities and endowments. © 2005 Wiley Periodicals, Inc.  相似文献   

14.
介绍一种能在WindowsNT的环境下使用Linux,Unix和NetWare的网络资源的解决方案,通过使用Samba软件包将Linux或Unix的资源映射成WindowsNT的本地资源,以实现对WindowsNT用户的资源共享,使用本方案例户只需对NT进行一次登录就可以访问Linux,Unix,NetWare的文件服务器,并且可以实现二级文件安全管理,保障了Linux,Unix及NetWare文件服务器的安全性。  相似文献   

15.
In this paper, we study how flocking affects the accuracy and speed of individuals in long-range “migration”. Specifically, we extend a behavior that can generate self-organized flocking in a swarm of robots to follow a homing direction sensed through the magnetic field of the Earth and evaluate how the final points reached by the flock are scattered in space and how the speed of the flock is affected. We propose that four factors influence the performance of migration, in the proposed behavior, namely: (1) averaging through heading alignment behavior, (2) disturbances caused by proximal control behavior, (3) noise in sensing the homing direction, and (4) differences in the characteristics of the individuals. Systematic experiments are conducted to evaluate the effects of these factors using both physical and simulated robots. The results show that although flocking reduces the speed of an individual, it increases the accuracy of “migration” for flocks that are larger than a certain size.  相似文献   

16.
17.
Security policies: The phrase that strikes fear in the hearts of many security professionals. Policy and policy enforcement is a critical part of any organization’s security posture. Unfortunately, many administrators find policy mundane or frustrating. When it comes to wireless security, a clear and complete policy is even more critical. Few other technologies can punch a hole into the core of an organization’s network like wireless. Thankfully for security professionals and their employers, wireless networks are new, interesting, and dangerous enough to actually warrant interest in creating and enforcing a policy.  相似文献   

18.
The Travelling Thief Problem (TTP) is a novel problem that aims to provide a benchmark model of combinatorial optimization problems with multiple interdependent components. The TTP combines two other well known benchmark problems: the Travelling Salesman Problem (TSP) and the Knapsack Problem (KP). The aim of this paper is to study the interdependence between the TTP's components, and how it makes solving each sub-problem independently from the other useless for solving the overall problem. A local search approach is proposed to solve the TTP. Two simple iterative neighborhood algorithms based on our approach are presented, analyzed, and compared to other algorithms. Initialization strategies are empirically investigated. The experimental results confirm that our approach was able to find new better solutions for many TTP instances.  相似文献   

19.
20.
As computer infrastructures become more complex, security models must provide means to handle more flexible and dynamic requirements. In the Organization Based Access Control (OrBAC) model, it is possible to express such requirements using the notion of context. In OrBAC, each security rule (permission, prohibition, obligation or dispensation) only applies in a given context. A context is viewed as an extra condition that must be satisfied to activate a given security rule. In this paper, we present a taxonomy of different types of context and investigate the data the information system must manage in order to deal with these different contexts. We then explain how to model and evaluate them in the OrBAC model.
Nora Cuppens-BoulahiaEmail:
  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号