iTrans.ir
سفارش ترجمه
خانه
راهنما
چگونه سفارش ترجمه دهیم
تماس با ما
ترجمه فوری
راهنمای استفاده از سایت
API
بیشتر...
پرسش و پاسخ
قیمت ترجمه
ثبت نام
ورود
021-66989400
021-66989500
0935-173-0404
نشانی و اطلاعات تماس
تگ ACCESS
جزئیات خدمات ترجمه در ترجمه تخصصی
data
security
security
security
security
security
security
A
A
security
standard
data
Passpoint
abstract
AUTOMATED TESTING WITH ACTS AND A MODEL CHECKER This tutorial
1
1
Journal of Network and Computer Applications 41 (2014) 379–388
کامپیوتر
Policy-Based Access Control 81
RC-MAC: Reduced Collision MAC for Bandwidth Optimization in Wireless
Network Working Group Barry M. Leiner
1017 RIACS August 1987 Network Requirements for Scientific Research Internet
RFC 1017 Requirements for Scientific Research August 1987 Bulk Transport
RFC 1017 Requirements for Scientific Research August 1987 Bulk Transport
RFC 1017 Requirements for Scientific Research August 1987 Yellow Pages
RFC 1017 Requirements for Scientific Research August 1987 Yellow Pages
RC-MAC: Reduced Collision MAC for Bandwidth Optimization in Wireless
RC-MAC: Reduced Collision MAC for Bandwidth Optimization in Wireless
1 Categories of Judicial Information Three categories of information are
RC-MAC: Reduced Collision MAC for Bandwidth Optimization in Wireless
RC-MAC: Reduced Collision MAC for Bandwidth Optimization in Wireless
Globecom 2012 - Next Generation Networking and Internet Symposium
Globecom 2012 - Next Generation Networking and Internet Symposium
718 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 15, NO. 2, SECOND QUARTER 2013
A Context-Aware Security Architecture for Emerging Applications
This technology uses both the internet and the central servers
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
SECURITY ISSUES OF CLOUD COMPUTING Security issues of cloud computing
the online payment company is no longer allowing users to
Cloud computing is a new computing model which is based
196 The needs of rural communities
Computer Communications xxx (2014) xxx–xxx
Computer Communications xxx (2014) xxx–xxx
processes and personnel for collecting, processing,
AX.25 Link Access Protocol
FEATURE
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 61, NO. 7, SEPTEMBER 2012 3139
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 61, NO. 7, SEPTEMBER 2012 3139
Theremoval of the key levers of power and violence from
1.4 / SECURITY SERVICES 15
18
20 CHAPTER 1 / INTRODUCTION
1.8 / OUTLINE OF THIS BOOK 21
1.4 / SECURITY SERVICES 15
18
20 CHAPTER 1 / INTRODUCTION
1.8 / OUTLINE OF THIS BOOK 21
Abstract Wireline telecommunications infrastructure in the customer access network or
Open access in next generation access (NGA) networks
Danish municipalities are not permitted to provide broadband services directly. However, privately-
9487 Horse Strategy Covers 4th 8/11/05 9:47 am Page 1
1
INTERNATIONAL TELECOMMUNICATION UNION
TABLE OF CONTENTS
2013 International Conference on Electrical Information and Communication Technology (EICT)
2013 International Conference on Electrical Information and Communication Technology (EICT)
Wireless Pers Commun (2014) 78:1683-1697
2013 International Conference on Electrical Information and Communication Technology (EICT)
We aim to list every detail about every movie and
The Critical Security Controls
A control system is a device or set of d eus vied ces to manage, command, dire,c or t
Computer
Adaptive Software Cache Management for
Author's Accepted Manuscript
Vladimir Šimovi ć, Matija Varga, Predrag Oreški
INFORMATION SECURITY
INFORMATION SECURITY
Journal of Network and Computer Applications 35 (2012) 1367–1373
Das 25-ch14-361-388-9780124158153 2011/12/19 12:26 Page 361 #1
Underpinning our earlier discussion on research design has been the
nextbike Standard Terminal
PART1-15057
PART3-15057
there has not been much work in supporting security in
International Journal of Soft Computing and Engineering (IJSCE)
International Journal of Soft Computing and Engineering (IJSCE)
International Journal of Soft Computing and Engineering (IJSCE)
Mobile Social Media for a Private Higher Education Institution in South
Computer Networks 73 (2014) 185–194
The Bw-Tree: A B-tree for New Hardware
Comparison of Strategies and Policies 43
Constructing a Remote Monitoring and Control
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
OperatingSystemSecurity SynthesisLectureson
Ensuring computers are dedicated to their intended use has never
or trade show attendees change the settings on a public
Companies around the globe have discovered the benefits of these
Companies around the globe have discovered the benefits of these
Companies around the globe have discovered the benefits of these
Companies around the globe have discovered the benefits of these
Author's Accepted Manuscript
Author's Accepted Manuscript
Author's Accepted Manuscript
Author's Accepted Manuscript
understood and agreed to be bound by the terms and
Access Control in
49
دانشگاهی
NATURE OF MANAGERS
NATURE OF MANAGERS
NATURE OF MANAGERS
INTRODUCTION
ExecutiveSummary Music streaming services allowusers access to millions of tracks
J.ParallelDistrib.Comput.73(2013)570–579
Hippocratic Databases
Hippocratic Databases
1 Introduction Since the first computer virus Creeper appeared in
1 Introduction Since the first computer virus Creeper appeared in
Developing Adaptable, Efficient Mobile Library Services: Librarians as Enablers
UNDERSTANDING WiMAX:
The Home Needs an Operating System (and an App Store)
Mozilla Firefox is so flexible that you can not only
Mozilla Firefox is so flexible that you can not only
Mozilla Firefox is so flexible that you can not only
A Survey on MAC Protocols for Underwater Wireless Sensor Networks
Start sharing and storing for Free شروعبهاشتراکگذاریوذخیرهسازیبرای رایگان Hightail is
the legendary ThinkPad ergonomic keyboard is renowned for its full
the legendary ThinkPad ergonomic keyboard is renowned for its full
the legendary ThinkPad ergonomic keyboard is renowned for its full
the legendary ThinkPad ergonomic keyboard is renowned for its full
the legendary ThinkPad ergonomic keyboard is renowned for its full
Rev. Confirming Pages
Accounting quality and access to credit lines We examine the
Securing Distributed Storage: Challenges, Techniques,
What is metadata?
Rev. Confirming Pages
s main function starts with capital M and is named
s main function starts with capital M and is named
s main function starts with capital M and is named
The Mobile Agents A mobile agent is a program that
w w
Preface
Available online at www.sciencedirect.com
State the factors affecting the mining method selection for this
Dubai Silicon Oasis launches roads improvement project
Providing easy public access to XBRLformatted data of company
WHO – WIPO – WTO
Achieving sustainable and more equitable public health outcomes depends on
Achieving sustainable and more equitable public health outcomes depends on
Achieving sustainable and more equitable public health outcomes depends on
Security for Network Attached Storage Devices
I was able to set up a fortress that he
I was able to set up a fortress that he
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
This article has been.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
Available online at www.sciencedirect.com
REVIEW OF ACCESS CONTROL MODELS FOR
created applications on a development platform that a cloud service
created applications on a development platform that a cloud service
created applications on a development platform that a cloud service
created applications on a development platform that a cloud service
created applications on a development platform that a cloud service
created applications on a development platform that a cloud service
Tests of validity ensure that for a process that is
امنیت در اندروید
Exam Ref
ComputerStandards&Interfaces36(2014)480–488
White Paper
White Paper
782 JOURNAL OF NETWORKS, VOL. 5, NO. 7, JULY 2010
Intranet/Extranet
Intranet/Extranet
Marketing Information Systems 149
Performance evaluation of remote display access for mobile cloud
Chapter 5
computers & security 49 (2015) 132e146
core designs migrated from Symmetric Multi Processing to cache coherent
Chapter 5
Networks and Communication Studies,
UDC 621.398: 681.3
Abstract This paper provides an overview of RADIUS deployment in
Abstract This paper provides an overview of RADIUS deployment in
Geopolitical Implications In a meeting with government officials on July
Information Sciences 305 (2015) 357–383
Lab 1 Introduction to Access Noxim
Chapter 2
A Survey on Green 5G Cellular Networks
A Survey on Green 5G Cellular Networks
Trustworthy Computing
Trustworthy Computing
Information Sciences 305 (2015) 357–383
Information Sciences 305 (2015) 357–383
372 M. Ali et al./Information Sciences 305 (2015) 357–383
372 M. Ali et al./Information Sciences 305 (2015) 357–383
368 M. Ali et al./Information Sciences 305 (2015) 357–383
372 M. Ali et al./Information Sciences 305 (2015) 357–383
USOO8972403B2
Technovation 32 (2012) 216–226
TeamViewer
11e EDCA providing QoS Guarantees Abstract One of the challenges
wireless convergence has become of particular interest recently because a
that was to change the face of commercial computing profoundly
2015 IEEE 29th International Conference on Advanced Information Networking and Applications
Available online at www.sciencedirect.com
InformatI on t echnology
InformatI on t echnology
InformatI on t echnology
MULTI-TENANT ACCESS CONTROL FOR CLOUD SERVICES
CONCURRENCY AND COMPUTATION: PRACTICE AND EXPERIENCE
CONCURRENCY AND COMPUTATION: PRACTICE AND EXPERIENCE
Cloud Computing Risk Assessment: A
WHO’s role, mandate and activities
A public health perspective Introduction The world drug problem1 continues
A public health perspective Introduction The world drug problem1 continues
The Journal of Systems and Software 85 (2012) 77–86
1.3: Understanding Digital Content and Services Ecosystems
1.3: Understanding Digital Content and Services Ecosystems
WebOS: Operating System Services for Wide Area Applications
Information Sciences 305 (2015) 357–383
GEZE SAFET Y TECHNOLOGY
Swiss privacy Tresorit handles data under Swiss privacy laws that
secure software as a service We document here an enterprise
businessprocesses Companies understand the importance of auditing the compliance of
3,5.2 M,r.ir,.rizar.rg
Executive Summary
The Analysis of the Security Strategy of Embedded Mobile Database
Information Sciences 305 (2015) 357–383
Measuring
her own VM image or can use an image from
her own VM image or can use an image from
InformatI on t echnology
LE feature the Axis Zipstream technology that lowers bandwidth and
defence and commercial sectors has confirmed the proposed acquisition of
Journal of Network and Computer Applications 35 (2012) 1831–1838
Retaining structures
Design of a Trusted File System Based on Hadoop
A Survey on Security of Hadoop
Kerberos can be connected to corporate LDAPenvironments to centrally provision
it ensures the reliability and safety from the three levels
Chapter 3
I am certain it was not even considered as part
امنیت هادوپ
امنیت هادوپ
Kerberos can be connected to corporate LDAPenvironments to centrally provision
امنیت هادوپ
Kerberos can be connected to corporate LDAPenvironments to centrally provision
survey security of hadoop
Design of a Trusted File System Based on Hadoop
Learning with Real-Time Rich Media Technologies
JOURNAL OF LIGHTWAVE TECHNOLOGY, VOL. 32, NO. 20, OCTOBER 15, 2014 3373
JOURNAL OF LIGHTWAVE TECHNOLOGY, VOL. 32, NO. 20, OCTOBER 15, 2014 3373
5.2 Reference Model, Architecture, Services, Frame Formats
Retaining structures
TSplus White Paper
Extensions to IEEE 802 MAC Protocols for Heterogeneous Multi-hop Networks 227
45810-1
45810-2
CognitiveRadioand
ABOUT THE COMMISSION
Measuring
ABOUT THE COMMISSION
An overview of the state of broadband (Internet) - 2015
ABOUT THE COMMISSION
ABOUT THE COMMISSION
Cost Reducing The profits that cloud computing providers get is
cloud computing
Available online at www.sciencedirect.com
Expert Systems with Applications 39 (2012) 11243–11249
Information Security Technical Report, Vol 6, No. 2 (2000) 95-102
Security Implications of the Choice of Distributed Database
Information Security Technical Report, Vol 6, No. 2 (2000) 95-102
Security Implications of the Choice of Distributed Database
OperatingSystemSecurity SynthesisLectureson
Wireless Enhancements for Storage Area Networks
C10 06/30/2010 14:48:30 Page 195
Database
Since 1985 the Los Angeles Venture Association has been providing
Malware Protection Malware on person computers takes the forms of
MESSAGE PROCESSING AND THE
CLOUD SECURITY
Users need automated tools to help manage such configurations that
Access to finance for innovative SMEs since the financial crisis
Access to finance for innovative SMEs since the financial crisis
Users need automated tools to help manage such configurations that
Users need automated tools to help manage such configurations that
Security Comes to SNMP: The New
Data Security Challenges and Its Solutions in Cloud Computing
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
16 MICROWAVE FILTER STRUCTURES
and orthogonal CDMA all have the same theoretical capacity in
and orthogonal CDMA all have the same theoretical capacity in
1 WSSO System
1 WSSO System
Network and Complex Systems www.iiste.org
confidentiality and disclosure of health care information Questions about confidentiality
International Journal of Future Generation Communication and Networking
OperatingSystemSecurity SynthesisLectureson
www.comsoc.org/pubs/ surveys
describes any cloud service where consumers are able to access
describes any cloud service where consumers are able to access
Journal of Network and Computer Applications 34 (2011) 1–11
مباحت آتش نشانی
Methods for Access Control:
Methods for Access Control:
COMPUSOFT, An international journal of advanced computer technology, 2 (12), December-2013 (Volume-II, Issue-XII)
the initial introduction found that 83% preferred voice verification over the 5 digit
OWASP Papers Program
SCHILLER
SCHILLER
SCHILLER
SCHILLER
Bass.book Page 327 Thursday, March 20, 2003 7:21 PM
Exchange Server 2010 Design and Architecture at Microsoft How Microsoft
Downloaded from http://iranpaper.ir
Downloaded from http://iranpaper.ir
FutureGenerationComputerSystems ( ) –
INTRODUCTION The previous chapter established the benefit to a small
Quick Start Guide
Technology in Society 41 (2015) 65e75
FutureGenerationComputerSystems ( ) –
ARTICLE IN PRESS
ARTICLE IN PRESS
Review
46
INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH VOLUME 3, ISSUE 1, JANUARY 2014 ISSN 2277-8616
Chapte
Chapte
PROVIDING END-TO-END QOS IN 4G NETWORKS
M06_SAUN6860_05_SE_C06.QXD 12/2/09 12:52 pm Page 173
Management interfaces reside at various levels in the software stack
yet they present a serious threat due to rogue malicious
yet they present a serious threat due to rogue malicious
a considerably wide spectrum of attacks on hardware virtualization has
the adversary could detect and identify the virtual system he
COMPROMISING THE HOST OS One of the most appealing targets
the adversary could detect and identify the virtual system he
Virtual machine migration makes system deployment fast and easy by
COMPROMISING THE HOST OS One of the most appealing targets
the adversary could detect and identify the virtual system he
IT Auditing, Second Edition Reviews
collaborative Protection Profile for Network Devices
554257 WJNXXX10.1177/0193945914554257Western Journal of Nursing ResearchEditorial
Sci Eng Ethics
554257 WJNXXX10.1177/0193945914554257Western Journal of Nursing ResearchEditorial
Sci Eng Ethics
Terms of Use These Terms of Use were last updated
Databases are the repositories of the most important and expensive
with a central mainframe supporting a number of directly connected
Chaudhuri-Digital Rights Management – a Technological Measure for Copyright Protection and its Possible Impacts
with a central mainframe supporting a number of directly connected
SECURITY
Databases are the repositories of the most important and expensive
Accessing Cloud Storage using the Android Storage Access Framework Recent
Accessing Cloud Storage using the Android Storage Access Framework Recent
Accessing Cloud Storage using the Android Storage Access Framework Recent
Accessing Cloud Storage using the Android Storage Access Framework Recent
hypervisor escapes are possibly the most frightening security issues related
CHAPTER
CHAPTER
hypervisor escapes are possibly the most frightening security issues related
hypervisor escapes are possibly the most frightening security issues related
Created in Master PDF Editor - Demo Version
Introduction Firewall Planning and Design Processes
دلیل این مسئله عدم وجود دسترسی به ساختار از طریق
یک Access method برای مدیریت inode ها در سیستم عامل
یک Access method برای مدیریت inode ها در سیستم عامل
از این رو دسترسی و استفاده از مقادیر کلیدی به
از این رو دسترسی و استفاده از مقادیر کلیدی به
5 ما گرامر کاملی برای کدنویسیبراساس استفاده از access method
شود که ایجاد آنها به صورت مشابه از یک چهارچوب
ساختار درخت در انجام عملیات استخراج اولین و آخرین مقدار
BS ISO 22846-2:2012
Access
Available online at www.sciencedirect.com
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
A New Dynamic Data Replication Algorithm to
SDN and Fog Computing Rapid increase in number and diversity
SDN and Fog Computing Rapid increase in number and diversity
ARTICLE IN PRESS
Your face is NOT your password
[ABTRACTS]
[ABTRACTS]
[ABTRACTS]
[ABTRACTS]
[ABTRACTS]
[ABTRACTS]
The Basics of
The Basics of
UNITED
UNITED
The explosive growth of the Internet has raised concerns about
But it has become far more than just a library
ARTICLE IN PRESS
It means lack of basic capacity to participate effectively in
Simulation Modelling Practice and Theory 73 (2017) 43–54
ComputerStandards&Interfaces36(2014)759–775
ComputerStandards&Interfaces36(2014)759–775
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54
ACCESS Form 11
T echnical P aper
Preprint: http://arxiv.org/abs/1307.2661
SmartLocks: LessonsforSecuring
Parallels RAS v16 Virtual application and desktop delivery can be
Exam Ref
Computer Security
If the goal of knowledge societies is to foster peace
ForestPolicyandEconomics58(2015)47–55
Multi-ContextTLS(mcTLS):
J Supercomput
0
SQLiteOpenHelper
Abstract
بایگانی آکاشیک چیست
Until recently the Food and Drug Administration (FDA), which regulates the
S e e d i s c u s s i o n s , s t a t s , a n d a u t h o r p r o f i l e s f o r t h i s p u b l i c a t i o n a t : h t t p s : / / w w w . r e s e a r c h g a t e . n e t / p u b l i c a t i o n / 2 3 3 3 9 1 3 5 4
But can you successfully master a language only using online
Payment Card Industry (PCI)
Payment Card Industry (PCI)
Payment Card Industry (PCI)
one of the seven pillars of the Plan for the
GTA EXTRANET - TERMS OF USE ("Agreement") 1. Terms of Use
J Sign Process Syst
immediately imports a concept that has developed in the physical
A more expansive view was adopted by the Supreme Court
5G Mobile and Wireless Communications Technology
Int. J. Communications, Network and System Sciences, 2013, 6, 443-450
Int. J. Communications, Network and System Sciences, 2013, 6, 443-450
صفحه 1 تا 13
name of information flow control SFP
THE WORLD’S
THE WORLD’S
OUR STORY THE SERVICE OUR PEOPLE OUR PEOPLE RESTAURANTS & NIGHTLIFE TICKETS & EVENT ACCESS MEMBER BENEFITS MEMBER BENEFITS
THE WORLD’S
OUR STORY THE SERVICE OUR PEOPLE OUR PEOPLE RESTAURANTS & NIGHTLIFE TICKETS & EVENT ACCESS MEMBER BENEFITS MEMBER BENEFITS
THE WORLD’S
OUR STORY THE SERVICE OUR PEOPLE OUR PEOPLE RESTAURANTS & NIGHTLIFE TICKETS & EVENT ACCESS MEMBER BENEFITS MEMBER BENEFITS
Journal of Biomedical Informatics 46 (2013) 541–562
behnamkeshani.com
پس از پیاده سازی پروژه با آنالیز مراحل اجرایی پروژه
5004-3
Blockchain Solutions for Big Data Challenges
The popularity of Blockchain technology and thehuge extent of its
DATA SECURITY IN HYIP PROJECTS As HYIPs are the resources
Contents listsavailableatScienceDirect
Contents listsavailableatScienceDirect
focus-sitrep-42-covid-19
DHS Science and Technology Directorate
Statement of Purpose
Freedom of expression
من درسال ۲۰۱۴ با شرکت در کمپ آموزشی میکروتیک با
Phishing attacks What is a phishing attack Phishing is a
7: Tooth morphology and pulpal
there are so many different ways to run your business
Unauthorised activities/network intrusions
5GTHREATS 5G introduces significant innovation to mobile networks by integrating
These threats relate to elements of the Core Network thatincludes
This threat relates to availability issues anddisclosure of sensitive data
BSI Security Testing video
Thi T T T Th T T T Th Th
How to Implement a Zero Trust Security Strategy How Does
How to Implement a Zero Trust Security Strategy How Does
Securing the edge with Zero Trust The proliferation of cloud
the attacker sends a decryption key to restore access to
How AI is Helping in the Fight for Safer Factories
is the process of restricting unauthorized users and devices from
CK Framework to Fight Ransomware Attacks Chinese military general Sun
you ensure that connection attempts provide two or more pieces
Received November 21, 2020, accepted December 7, 2020, date of publication December 29, 2020,
EBOOK EXTRAS: v1.0
is an authentication method that lets users access multiple applications
This data could include anything from email addresses to financial
is an authentication method that lets users access multiple applications
This data could include anything from email addresses to financial
See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/3044068
Functional Implementation Techniques for CPU Cache Memories
229
Fortinet FortiGate™
Fortinet FortiGate™
Fortinet FortiGate™
Part I: General Network Design
Part I: General Network Design
BIRMINGHAM—MUMBAI
Security
Security
Certificate added Certificate saved Certificate deleted You are not allowed