共查询到20条相似文献,搜索用时 15 毫秒
1.
2.
金庸在《鸳鸯刀》中写道,称霸江湖的秘诀原来只是“仁者无敌”四个字。那么,顺风顺水行走职场“江湖”的秘诀又是什么呢? 相似文献
3.
4.
"天下风云出我辈,一入江湖岁月催.皇图霸业谈笑中,不胜人生一场醉.提剑跨骑挥鬼雨,白骨如山鸟惊飞.尘事如湖人如水,只笑江湖几人回."这首诗,似曾相识吧?森森然的杀气,跃然纸上;凛凛然的豪气,破墙而出.在《东方不败》的电影版故事里,岳灵姗在掩埋完被分尸的骏马后吟颂出这首浸满江湖风雨的诗句.…… 相似文献
5.
Heinrich Holst 《Datenschutz und Datensicherheit - DuD》2008,32(9):579-582
James Bit — der Name ist Programm. Im Auftrag von T-Systems sorgt der virtuelle Mitarbeiter für Informationssicherheit. 相似文献
6.
This issue's column presents highlights from our 2006 editorial board meeting to help you better understand where we see the magazine going. 相似文献
7.
8.
陈鹏 《网络安全技术与应用》2014,(7):120-120
随着科学技术和网络信息技术的飞速发展,越来越多的网络信息安全问题逐渐出现.本文主要研究了网络信息安全和网络安全之间的关系,并且对如何创造安全的网络环境提出了几点建议. 相似文献
9.
Fred Cohen 《Network Security》1998,1998(10):10-14
Over the last few years, computing has changed to an almost purely networked environment, but the technical aspects of information protection have not kept up. As a result, the success of information security programmes has increasingly become a function of our ability to make prudent management decisions about organizational activities. This series of articles takes a management view of protection and seeks to reconcile the need for security with the limitations of technology. 相似文献
10.
Fred Cohen 《Network Security》1999,1999(4):6-13
Computing operates in an almost universally networked environment, but the technical aspects of information protection have not kept up. As a result, the success of information security programmes has increasingly become a function of our ability to make prudent management decisions about organizational activities. Managing Network Security takes a management view of protection and seeks to reconcile the need for security with the limitations of technology. 相似文献
11.
The problem of escorting a moving target with a team of mobile robots was solved in this article by resorting to a formation control algorithm that can be cast in the framework of the NSB control approach. The overall mission, therefore, is decomposed into properly defined elementary tasks that are hierarchically arranged, so that the higher-priority tasks are not influenced by the lower-priority ones. The validity of the proposed approach has been proved by both simulation case studies and experimental results with a team of six Khepera II mobile robots. Stability analysis concerning effective conditions needed to verify that the behaviors of specific missions are properly defined and merged is under investigation. Future improvements might regard decentralization of the algorithm, consideration of the vehicles' nonholonomicity in the definition of the task functions, and the introduction of a piecewise-constant constraint for the linear velocity to allow application of the method to teams of cruise vehicles (e.g., a fleet of vessels or a flight of planes). 相似文献
12.
Multiagent Mission Specification and Execution 总被引:5,自引:1,他引:4
13.
14.
15.
机动防空任务聚合级装备作战单元维修性仿真 总被引:1,自引:0,他引:1
装备作战单元在执行任务过程中常处于聚合状态,影响其作战效能的重要因素之一就是任务维修性。任务维修性的度量参数有多种,文中采用恢复功能的任务时间(MTTRF),在分析聚合级装备作战单元层次和特性的基础上,剖析了聚合级装备作战单元MTTRF的具体含义;给出了在机动防空任务下聚合级装备作战单元MTTRF的仿真方法和流程,应用Petri网技术在ExSpect仿真环境下建立了聚合级装备作战单元机动防空任务下维修性的仿真模型,实现了对聚合级装备作战单元各层MTTRF的仿真。最后,通过一个实例对模型进行验证。 相似文献
16.
17.
Syed Rizvi Jungwoo Ryoo John Kissell William Aiken Yuhong Liu 《The Journal of supercomputing》2018,74(11):5774-5796
Cloud computing is clearly one of today’s most enticing technologies due to its scalable, flexible, and cost-efficient access to infrastructure and application services. Despite these benefits, cloud service users (CSUs) have serious concerns about the data security and privacy. Currently, there are several cloud service providers (CSPs) offering a wide range of services to their customers with varying levels of security strengths. Due to the vast diversity in the available cloud services, from the customer’s perspective, it has become difficult to decide which CSP they should use and what should be the selection criteria. Presently, there is no framework that can allow CSUs to evaluate CSPs based on their ability to meet the customer’s security requirements. We propose a framework and a mechanism that evaluate the security strength of CSPs based on the customer’s security preferences. We have shown the applicability of our security evaluation framework using a case study. 相似文献
18.
Bill Hancock 《Computer Fraud & Security》1998,1998(8):18-19
I am sitting on a plane, listening to two executives outline their strategy for a major buyout of a bridge/router vendor. Since I am a geek and understand what they are talking about, it's an interesting set of tactics that they are considering to get the price of the company down to something they want. What's even more interesting is how open they are with what they are talking about and, even more, I know the president of the company which they are planning to acquire. It would be very easy for me to make a phone call when we land and completely trash all their plans. 相似文献
19.
RFID security 总被引:2,自引:0,他引:2
Radio Frequency Identification (RFID) systems have become popular for automated identification and supply chain applications. This article describes the technical fundamentals of RFID systems and the associated standards. Specifically, we address the security and privacy aspects of this relatively new and heterogeneous radio technology. We discuss the related security requirements, the threats and the implemented mechanisms. Then the current security and privacy proposals and their enhancements are presented. Finally we discuss the role of this technology in Ubiquitous Computing. 相似文献
20.
Computer security has hit the mainstream. This paper is a high-level treatment of computer security, its concepts and terminology, and some pointers about where to go for more information. 相似文献