共查询到20条相似文献,搜索用时 15 毫秒
1.
2.
Geoff Shaw 《Network Security》2003,2003(9):12-14
Spyware is the term for a category of malicious software that affects privacy and confidentiality a lot more than viruses and other types of malicious software. The risks to business from viruses, and associated countermeasures are relatively well understood and discussed. However, whilst there is an overlap between the issues presented by viruses and spyware, this article focuses specifically on the issues associated with spyware, and the related categories of malicious software known as adware. It defines the terms used and describes the nature of the problem, what the security risks and issues are and what actions need to be taken by corporate IT Security Management and individuals to combat them. Whilst primarily aimed at the corporate audience, this white paper will also be useful to individuals. Indeed the issues facing individuals will need to be appreciated by corporations delivering E-commerce services. 相似文献
3.
当前,越来越多的计算机使用者面临着安全性和隐私泄露的威胁。这种威胁不是源于计算机病毒或黑客的攻击,而是源于一些秘密地安装在计算机上的监视程序。这些监视程序就是间谍软件,它们的任务就是记录和向第三方传递用户计算机的使用行为。正是由于它们的远程监视和交互功能引起了第三方的注意,从而造成非法利用。本文将结合一些实例讲述间谍软件的角色和功能,及一些合法的和非法的用途,最后提出一些防范策略。 相似文献
4.
Computer users are threatened by stealth invaders, in the form of spyware, which gather users' personal information for target marketing purposes, but can also disrupt the operation of the computer. This article examines the ethical and legal controversy within the United States surrounding spyware. the various methods of battling spyware, including approaches by individual users, organizations, and government oversight, legislation, and litigation, are discussed. 相似文献
5.
Hai Zhuge Xiaoqing Shi 《Computer》2003,36(10)
Since its initial outbreak, scientists have sought to control the severe acute respiratory syndrome epidemic (SARS). So far, though, these SARS researchers have paid too little attention to the complex relationships between the epidemic, the environment, and our Information and Knowledge Age society. Fortunately, information technology can help scientists investigate the epidemic's cause and unveil its relevant principles and rules. The ideal Internet-based eco-environment management system would integrate ecological environment evaluation, data collection and publication, simulation, forecasting, and situation monitoring. It could help governments make decisions based on the current ecological and epidemiological situation, forecast developments, and evaluate the eco-environment. Professional workers in various regions could store and publish information in the system and thus make that data immediately available to people in other regions. 相似文献
6.
7.
8.
9.
10.
Paul Gray 《Information Systems Management》2005,22(2):91-95
John Gantz and Jack M. Rochester. Pirates of the Digital Millennium: How the Intellectual Property Wars Damage
Our Personal Freedoms, Our Jobs, and the World Economy, Upper Saddle River, NJ: Prentice Hall Financial Times (2005), 294 pp.
Thomas R. Peltier, Justin Peltier, and John Blackley. Information Security Fundamentals, Boca Raton, FL: Auerbach Publications (2005), 262 pp.
Paul Reid. Biometrics for Network Security, Upper Saddle River, NJ: Prentice Hall PTR (2004), 252 pp.
Robert M. Slade. Software Forensics, New York: McGraw-Hill (2004), 215 pp. 相似文献
Our Personal Freedoms, Our Jobs, and the World Economy, Upper Saddle River, NJ: Prentice Hall Financial Times (2005), 294 pp.
Thomas R. Peltier, Justin Peltier, and John Blackley. Information Security Fundamentals, Boca Raton, FL: Auerbach Publications (2005), 262 pp.
Paul Reid. Biometrics for Network Security, Upper Saddle River, NJ: Prentice Hall PTR (2004), 252 pp.
Robert M. Slade. Software Forensics, New York: McGraw-Hill (2004), 215 pp. 相似文献
11.
12.
13.
14.
Fighting shots are the highlights of action movies and an effective approach to discriminating fighting shots is very useful for many applications,such as movie trailer construction,movie content filtering,and movie content retrieval. In this paper,we present a novel method for this task.Our approach first extracts the reliable motion information of local invariant features through a robust keypoint tracking computation;then foreground keypoints are distinguished from background keypoints by a sophisticated voting process;further,the parameters of the camera motion model is computed based on the motion information of background keypoints,and this model is then used as a reference to compute the actual motion of foreground keypoints;finally,the corresponding feature vectors are extracted to characterizing the motions of foreground keypoints,and a support vector machine(SVM) classifier is trained based on the extracted feature vectors to discriminate fighting shots.Experimental results on representative action movies show our approach is very effective. 相似文献
15.
戴建林 《计算机光盘软件与应用》2011,(11)
随着高层建筑数量的不断增多,社会建筑火灾扑救难度不断增大,同时新时期的消防承担着各种急难险重的任务,这都给灭火救援工作带来了极大的挑战.在灭火和救援中采用图传技术有助于灭火救援工作的顺利开展,可将火场情况和现场灾情即时的反馈到指挥部.无线图传技术是目前运用较多的新技术,其能够通过无线方式将灾害信息传输给消防指挥人员,以便及时制定针对性的解决方案,针对这一点,本文重点分析了无线图传技术在消防灭火救援中实际运用. 相似文献
16.
17.
如何获取人在回路作战仿真实验中比较理想的基础数据,这是研究敌我双方武器系统优劣对作战仿真结果的影响、探讨装备是否满足作战需求的前提.正确的数据将推动装备建设,为作战装备需求决策服务;不正确的数据可能导致重大的决策失误,造成不可估量的损失.只有保证了仿真数据的正确性,仿真结果才有实际应用的价值.以坦克模拟器的操作人员为研究对象,以装甲兵数字化部队作战仿真实验室的虚拟战场环境为平台,从操作人员的角度分析了人在回路作战仿真中影响操作差错的各方面因素,并组织实验验证了影响操作差错的主要因素. 相似文献
18.
本文介绍了采用可编程控制器(PLC)实现的高层建筑中消防泵组的自动控制设计.文中详细讨论了控制系统的工作原理、信号的检测以及系统的硬件结构和软件设计. 相似文献
19.
随着网络安全的不断深入,传统的边界防火墙已经不能适应企业发展的要求。本文先简要介绍了分布式防火墙的概念,然后从分布式防火墙的原理及体系结构方面进行详细阐述.最后结合利用分布式防火墙杀毒与防黑客攻击和实现VPN通信等方面说明其在企业中的应用和优势。 相似文献
20.
Probabilistic proximity search: Fighting the curse of dimensionality in metric spaces 总被引:1,自引:0,他引:1
Proximity searches become very difficult on “high dimensional” metric spaces, that is, those whose histogram of distances has a large mean and/or a small variance. This so-called “curse of dimensionality”, well known in vector spaces, is also observed in metric spaces. The search complexity grows sharply with the dimension and with the search radius. We present a general probabilistic framework applicable to any search algorithm and whose net effect is to reduce the search radius. The higher the dimension, the more effective the technique. We illustrate empirically its practical performance on a particular class of algorithms, where large improvements in the search time are obtained at the cost of a very small error probability. 相似文献