iTrans.ir
سفارش ترجمه
خانه
راهنما
چگونه سفارش ترجمه دهیم
تماس با ما
ترجمه فوری
راهنمای استفاده از سایت
API
بیشتر...
پرسش و پاسخ
قیمت ترجمه
ثبت نام
ورود
021-66989400
021-66989500
0935-173-0404
نشانی و اطلاعات تماس
تگ server
جزئیات خدمات ترجمه در ترجمه تخصصی
security
security
security
security
server
server
server
virtualization
security
information
method
information
Video
Video
Introduction and Overview
Chapter 8
communicatii
2009 Third International Conference on Multimedia and Ubiquitous Engineering 2009 Third International Conference on Multimedia and Ubiquitous Engineering
The small company where you work needs to implement a
Security for Cloud Based Services
Computer Network Security Protocols
Build Your Own Database Driven Website
Ubuntu Server Guide Ubuntu Server Guide
Volume 3, Issue 3, March 2013 ISSN: 2277 128X
Volume 3, Issue 3, March 2013 ISSN: 2277 128X
Abstract�Cloud Computing has been envisioned as the next-generation architecture of IT Enterprise. In the
Abstract�Cloud Computing has been envisioned as the next-generation architecture of IT Enterprise. In the
the administrators possess too much data to dissect effectivelyto determine
شبکه
The many advantages of cloud computing are increasingly attracting individualsand
The many advantages of cloud computing are increasingly attracting individuals
The many advantages of cloud computing are increasingly attracting individuals
The many advantages of cloud computing are increasingly attracting individuals
The many advantages of cloud computing are increasingly attracting individuals
The many advantages of cloud computing are increasingly attracting individuals
The many advantages of cloud computing are increasingly attracting individuals
262 IEEE SYSTEMS JOURNAL, VOL. 4, NO. 2, JUNE 2010
Comparing the Performance of Web Server Architectures
ScalingMemcacheatFacebook
ve seen pop up in the last couple weeks is
ScalingMemcacheatFacebook
It is designed to scale to a very large number
Pipelining web pages for high performance By Changhao Jiang on
Thrift: Scalable Cross-Language Services Implementation
A Game Theoretic Resource Allocation for Overall Energy
Building an Efficient and Scalable DeepLearning Training System TrishulChilimbi Yutaka
Settings have been successfully updated Unable to write to file
International Journal of Knowledge www.ijklp.org
6-7-8
103
47627c13.qxd:WroxPro 9/29/07 3:35 PM Page 525
Preface
a single program can retrieve information stored in millions of
Expert Systems with Applications 41 (2014) 7789–7796
Das 25-ch14-361-388-9780124158153 2011/12/19 12:26 Page 361 #1
Y.Gaoetal./JournalofComputerandSystemSciences79(2013)1230–1242 1233
1232 Y.Gaoetal./JournalofComputerandSystemSciences79(2013)1230–1242
Y.Gaoetal./JournalofComputerandSystemSciences79(2013)1230–1242 1233
we are pleased to submit you our best proposal regarding
This white paper covers failover cluster architecture and concepts for
Before looking at these options and how you can configure
SQL Injection Attacks and Defense
0 and later versions is quite different from that of
Preface
Basic Network Concepts This chapter covers the fundamental networking concepts
Basic Network Concepts This chapter covers the fundamental networking concepts
International Journal of P2P Network Trends and Technology- Volume1Issue1- 2011
In the name of god
M03_CHAF9601_04_SE_C03.QXD:D01_CHAF7409_04_SE_C01.QXD 16/4/09 11:09 Page 157
M03_CHAF9601_04_SE_C03.QXD:D01_CHAF7409_04_SE_C01.QXD 16/4/09 11:09 Page 157
M03_CHAF9601_04_SE_C03.QXD:D01_CHAF7409_04_SE_C01.QXD 16/4/09 11:09 Page 157
DNS rebinding
DNS rebinding
Constructing a Remote Monitoring and Control
and perhaps some interactive functions that respond to data and
and perhaps some interactive functions that respond to data and
and perhaps some interactive functions that respond to data and
and perhaps some interactive functions that respond to data and
and perhaps some interactive functions that respond to data and
and perhaps some interactive functions that respond to data and
_.QXD 16/4/09 11:09 Page 163
2 3 2 C h a p t e r 1 3 • U n d e r s t a n d i n g A v a i l a b i l i t y
IEEE International Conference on Communications 2013: IEEE ICC'13 - The IEEE ICC 2013 2nd International Workshop on Small
Deploying Video-on-Demand Services on Cable
Web browsers and servers Web browsers are software such as
15.3 Virus Filtering 333
Available online at www.sciencedirect.com
134 C H A P T E R 3 E - c o mm e r c e I n f r a s t r u c t u r e : T h e I n t e r n e t , W e b , a n d M o b i l e P l a t f o r m
134 C H A P T E R 3 E - c o mm e r c e I n f r a s t r u c t u r e : T h e I n t e r n e t , W e b , a n d M o b i l e P l a t f o r m
8 Attack Session Reconstruction The goal of the attack session
TM
and automobile as a paradigm shift in the way people
1 Introduction Since the first computer virus Creeper appeared in
1 Introduction Since the first computer virus Creeper appeared in
into a numerical IP address that is used to route
is a type of cyber attack with the intention to
is a type of cyber attack with the intention to
Evaluating Energy Consumption in CDN Servers
http://csharpblog.blogfa.com
2014 IEEE 13th International Symposium on Network Computing and Applications 2014 IEEE 13th International Symposium on Network Computing and Applications
Networking systems
Networking systems
WEB STANDARDS SOLUTIONS
SPAGNA LAYOUT_Layout 1 4/1/13 1:34 PM Page 132
Available online at www.sciencedirect.com
A Taxonomy and Survey of Content Delivery Networks
security and privacy protection is an important issue that needs
we propose a novel approach to secure ownership transfer in
based on the hardness of the Learning Parity with Noise
we propose a novel approach to secure ownership transfer in
Secure RFID Authentication Protocol with Key
390 IEEETRANSACTIONSONINFORMATIONFORENSICSANDSECURITY,VOL.8,NO.2,FEBRUARY2013
2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications
Securing Distributed Storage: Challenges, Techniques,
Hierarchical Disaster Tolerant Architecture Based on Virtual Storage Technology Abstract
the status of data is becoming increasing important in information
Microsoft reminded SQL Server 2005 users that all support for
The Mobile Agents A mobile agent is a program that
Available online at www.sciencedirect.com
17
Knowl Inf Syst (2011) 26:435–465
Knowl Inf Syst (2011) 26:435–465
Knowl Inf Syst (2011) 26:435–465
Knowl Inf Syst (2011) 26:435–465
Knowl Inf Syst (2011) 26:435–465
it is implicitly assumed that the location server receives actual
Knowl Inf Syst (2011) 26:435–465
Leases: An Efficient Fault-Tolerant Mechanism
Leases: An Efficient Fault-Tolerant Mechanism
Leases: An Efficient Fault-Tolerant Mechanism
Knowl Inf Syst (2011) 26:435–465
Available online at www.sciencedirect.com
Design and Implementation of A Content-aware Switch using A Network
aware Switch using A Network Processor Abstract Cluster based server
aware Switch using A Network Processor Abstract Cluster based server
Design and Implementation of A Content-aware Switch using A Network
aware Switch using A Network Processor Abstract Cluster based server
Design and Implementation of A Content-aware Switch using A Network
TCP/IP Tutorial and
IP may be contained within the SNAP encapsulation of IP
Design and Implementation of A Content-aware Switch using A Network
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
OSSEC Introduction and Installation Guide
800 JOURNAL OF NETWORKS, VOL. 5, NO. 7, JULY 2010
Chapter 3
Countermeasure 2 (Non-Malleability) Inputs to a mixnet are made non-malleable, so
3.4.3 Verification independent of number of mix servers
each decryption server distributes shares of its secret key to
we developers have seen many changes in terms of how
Fuzzification is closely related to knowledge because the membership functions
Journal of Network and Computer Applications 36 (2013) 1116–1130
Agile, Dynamic Provisioning of Multi-tier Internet Applications
17
Concept Abstract Most computer systems are currently being integrated into
ConceptAbstractMost computer systems are currently being integrated into
ResultsThe results section describes the results from the testing
Volume Licensing brief
Volume Licensing brief
Chapter 5
is a mechanism for making information stored in different formats
WhereItCameFromandWhatItIs The World Wide Web is an Internet facility that
GO
Server
Journal of Network and Computer Applications 35 (2012) 763–769
www.it-ebooks.info Getting Started with SQL
Chapter 5
Abstract This paper provides an overview of RADIUS deployment in
Abstract This paper provides an overview of RADIUS deployment in
JavaScript functions are capable of more than just merely enclosing
JavaScript functions are capable of more than just merely enclosing
How To Migrate from an Apache Web Server to Nginx
Fighting a bank spoofing attack: an out of page
Prevention of Cross-Site Scripting Attacks
Solarwinds 3
Solarwinds 4
How To Migrate from an Apache Web Server to Nginx
®
®
the focus is on the impact a specific attack has
Agile, Dynamic Provisioning of Multi-tier Internet Applications
Apache JMeter
1
E – Business Platform for Mobile Users
performance of the application at peak load was a single
E – Business Platform for Mobile Users
WebOS: Operating System Services for Wide Area Applications
3
Hoseini-Hesam10
Table of Contents
Hoseini-Hesam-San10
01-P1503 10/24/2000 5:07 PM Page 1
ISSN: 2319-5967
php Choose this option to send the autoresponder to both
Journal of Network and Computer Applications 39 (2014) 140–151
یملع تلااقم و باتک دولناد و شرافس
7
7
7
7
Enabling Public Verifiability and Data Dynamics
Enabling Public Verifiability and Data Dynamics for Storage Security in
Enabling Public Verifiability and Data Dynamics
Enabling Public Verifiability and Data Dynamics
7
7
7
7
1
Cloud Computing Services and Virtualization Virtualization Services are changing the
Cloud Computing Services and Virtualization Virtualization Services are changing the
Web Browsing Performance ofWireless Thinclient ComputingABSTRACTWeb applications
Web Browsing Performance of Wireless Thinclient Computing ABSTRACT Web applications
امنیت هادوپ
Authentication Service in Hadoop using One Time Pad
3 Challenges in Designing Security Mechanism for Hadoop Hadoop uses
7
Existingtimeserver Ifyou already have an existing NTP server set up
Corporate Portals Empowered with XML and Web Services
PART II
Distributed Denial of Service attack on Cloud:
www.it-ebooks.info Microsoft SQL
زمانی که به توصیه یکی از دوستان دانشگاهی خود در
have given a two phase heuristic algorithm for solving the
I am sorry for the continuing issues
Design Example 1 – Doubling Arrival Rate
Consider a server farm with a central dispatcher and several
Consider a server farm with a central dispatcher and several
Consider a server farm with a central dispatcher and several
Consider a server farm with a central dispatcher and several
Consider a server farm with a central dispatcher and several
More Design Examples
Practical Implementation of a Secure Email
ِDNS
T-DNS:Connection-OrientedDNS
Network Working Group Z. Hu
Connection-Oriented DNS
Connection-Oriented DNS
T-DNS:Connection-OrientedDNS
T-DNS:Connection-OrientedDNS
���������
Aitchison
Distributed Database
Distributed Database
Distributed Database
It is an integration of wireless sensor network with mobile
Web Browsing Performance of
7
ARTICLE IN PRESS
is an emerging paradigm to logically centralize the network control
Chapter 3
Chapter 3
Available online at www.sciencedirect.com
Search on Encrypted Data 403
Hakan Haclgiimiig, Bijit Hore, Bala Iyer, and Sharad Mehrotra
Search on Encrypted Data 405
406 Hakan Hac~giimiig, Bijit Hore, Bala Iyer, and Sharad Mehrotra
Search on Encrypted Data 405
406 Hakan Hac~giimiig, Bijit Hore, Bala Iyer, and Sharad Mehrotra
How to Upgrade Your Website PHP Version If you are
1 WSSO System
1 WSSO System
2010 IEEE 24th International Conference on Advanced Information Networking and Applications Workshops
Chapter 2
CDN performance in large-scale video-on-demand
and phish them with messages that look like they came
Bass.book Page 327 Thursday, March 20, 2003 7:21 PM
Exchange Server 2010 Design and Architecture at Microsoft How Microsoft
34311 (1) - MS08-040: Microsoft SQL Server Multiple Privilege Escalation (941203) (uncredentialed
35635 (1) - MS09-004: Vulnerability in Microsoft SQL Server Could Allow Remote Code Execution
70118 (1) - HP System Management Homepage ginkgosnmp.inc Command Injection
87011 (2) - Oracle WebLogic Java Object Unserialization RCE
00:00:00
00:00:00
Intr oducing
Introduction to Microsoft Windows Server 2016 Whether you are a
Introduction to Microsoft Windows Server 2016 Whether you are a
Introduction to Microsoft Windows Server 2016 Whether you are a
International Journal of Science and Research (IJSR)
This page intentionally left blank DISTRIBUTED SYSTEMS
Leases: An Efficient Fault-Tolerant Mechanism
24
Process Management a
Web-based Motion Detection System for Health Care
It defines security constructs and operating procedures that must be
It defines security constructs and operating procedures that must be
Z39.50 An Information Retrieval Protocol for Libraries
js was developed by Ryan Dahl in 2009 and its
Do I Need a Server?
Downloaded from http://nar.oxfordjournals.org/ at Amirkabir University of Technology on December 11, 2016
NETWORK TRAFFIC ANOMALY DETECTION FOR IAAS
1 queue with server vacation on Bernoulli schedule and single
ANALYSIS OF TRANSIENT BEHAVIOUR OF M/G/1 QUEUE WITH SINGLE VACATION
1 Introduction Censorship of information on the Internet has been
Figure 1: VoIP Communications
Storage planning today means investing in an ecosystem that supports
Published online 24 April 2013 Nucleic Acids Research, 2013, Vol. 41, Web Server issue W471–W474
Load balancing refers to efficiently distributing incoming network traffic across
1 Introduction to Cloud Computing Reduced costs of processing and
1 Modeling of the Resource Allocation in Cloud Computing Datacenters
Load balancing refers to efficiently distributing incoming network traffic across
More about the HP ProLiant DL360:
1
2015 International Conference on Computing Communication Control and Automation
IEEETRANSACTIONSONCLOUDCOMPUTING, VOL.4, NO.X, XXXXX 2016 1
1
Distributed Systems
Distributed Systems
Distributed Systems
Dictionary Attack on Wordpress: Security and
2016 8th International Conference on Communication Systems and Networks (COMSNETS)
2016 8th International Conference on Communication Systems and Networks (COMSNETS)
Neurocomputing 181 (2016) 147–152
Created in Master PDF Editor - Demo Version
Configuration
Configuration
New Model for IT:
1
3System breakdown and analysis We split the proposed architecture for
Computers and Electrical Engineering 42 (2015) 74–89
SDN-based Game-Aware Network Management
Synology combines the features of public and private clouds to
Chapter 8. Server resources
ARTICLE IN PRESS
Downloaded from http://iranpaper.ir
Downloaded from http://iranpaper.ir
Storage Area
Downloaded from http://iranpaper.ir
Downloaded from http://iranpaper.ir
Proceedings of the 23rd International Conference on
Proceedings of the 23rd International Conference on
General Description
General Description
General Description
Journal of Systems Architecture 76 (2017) 117–132
Multi-ContextTLS(mcTLS):
A B S T R A C T Botnets are
DISTRIBUTED SYSTEMS
ی
Designing and Implementing
2014 IEEE International Conference on Cloud Computing
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2017.2742020, IEEE Access
7
Professional Expectations Teamwork Concepts and Issues درست به خاطر دارم
یک486 DX4 100 با4MB RAM و 170 MB هارد بدون
Energy Management Systems (EMS)
Why SSL? The Purpose of using SSL Certificates
1398به عنوان مدیر عامل بصورت تمام وقت معادل 44 ساعت
شروع آشنایی من با کامپیوتر به سالهای نوجوانی من برمی
شروع آشنایی من با کامپیوتر به سالهای نوجوانی من برمی
من در این دوره در مورد Infrastructure windows server 2008
من در سال 2018 پس از مطالعه کام مباحث دوره
November 29, 2019 Distributed Systems
November 29, 2019 Distributed Systems
AcceptedManuscript
Aware Proposals Cost is one of the main concerns for
Aware andServer Consolidation Proposals Energy consumption is a major issue
Aware and Server Consolidation Proposals Energy consumption is a major
Aware and Server Consolidation Proposals Energy consumption is a major
Below we discuss very briefly some popular solutionsfor bin packing
پروژه دیگری که تجربه الهام بخشی برای من به وجود
Accepted Manuscript
سابقه کار
پیکربندی Open LDAPبه روش رمز نگاری TLS پیکربندی و تغییرslapd
پیکربندی Open LDAPبه روش رمز نگاری TLS پیکربندی و تغییرslapd
پیکربندی Open LDAPبه روش رمز نگاری TLS پیکربندی و تغییرslapd
پیکربندی Open LDAPبه روش رمز نگاری TLS پیکربندی و تغییرslapd
پیکربندی Open LDAPبه روش رمز نگاری TLS پیکربندی و تغییرslapd
پیکربندی Open LDAPبه روش رمز نگاری TLS پیکربندی و تغییرslapd
پیکربندی Open LDAPبه روش رمز نگاری TLS پیکربندی و تغییرslapd
پیکربندی Open LDAPبه روش رمز نگاری TLS پیکربندی و تغییرslapd
پیکربندی Open LDAPبه روش رمز نگاری TLS پیکربندی و تغییرslapd
DHCP defined and how it works Dynamic host configuration protocol
distributed platform of servers that helps minimize delays in loading
How To Select The Best Processor For Your Server?
Moghimi
Computer Network Architecture Computer Network Architecture is defined as the
Apache CouchDB is an Open Source database management software published
Apache CouchDB is an Open Source database management software published
Apache CouchDB is an Open Source database management software published
Volume 2, No. 4, April 2011
Consult the IIS guidance in the Microsoft IIS documentation and
Consult the IIS guidance in the Microsoft IIS documentation and
Downloaded from https://iranpaper.ir
Computer Networks 197 (2021) 108327
How the Attack works and How to Prevent the SYN
A server works through a simple way of request and
Eight Ways to Save on Data Center Costs Whether you
Figure 22: In AirPort Utility for Mac, the Wireless Clients entry
Figure 22: In AirPort Utility for Mac, the Wireless Clients entry
Figure 22: In AirPort Utility for Mac, the Wireless Clients entry
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, VOL. 22, NO. 7, JULY 2021 4519
Linux Essentials (Version 1.6) | 1.2 Major Open Source Applications
Linux Essentials (Version 1.6) | 1.2 Major Open Source Applications