Results 51 to 60 of about 205,649 (344)

INSERTING MESSAGE SECRET ON FILE DATA BANK USING STEGANOGRAPHY ENGINEERING WITH EOF (END OF FILE) METHOD

open access: yesJurnal Riset Informatika, 2020
Exchanging information does not realize that is important information. Circulates often important information insignificant but such as account bank customer information.
Michael Sitorus, Deki Satria
doaj   +1 more source

Hackers, política y revolución

open access: yesQuestion, 2022
El siguiente artículo está basado en el capítulo tres de mi tesina de grado La cultura hacker como filosofía de vida en la era del capitalismo cibernético. Una aproximación al caso en Mendoza.
Nelson Scariot Esquivel
doaj   +1 more source

Analyzing Network Traffic for Malicious Hacker Activity [PDF]

open access: yes, 2004
Since the Internet came into life in the 1970s, it has been growing more than 100% every year. On the other hand, the solutions to detecting network intrusion are far outpaced.
Pyke, Randall
core  

Model of cybersecurity means financing with the procedure of additional data obtaining by the protection side [PDF]

open access: yes, 2020
The article describes the model of cybersecurity means financing strategies of the information object with incomplete information about the financial resources of the attacking side.
Buriachok, Volodymyr   +7 more
core  

Digital diagnostics, biomarkers and therapeutics in an evolving healthcare system: From promise to practice

open access: yesBritish Journal of Clinical Pharmacology, EarlyView.
Abstract Health care is shifting towards a digital‐guided system, integrating digital diagnostics, biomarkers and therapeutics in many care pathways. However, despite rapid technological advancement and preliminary adoption accelerated by the COVID‐19 pandemic, a significant implementation gap persists. This narrative review explores the causes of this
Mees H. P. Stoop   +3 more
wiley   +1 more source

Estrategias de ciberguerra: Israel y Rusia

open access: yesPerspectivas en Inteligencia, 2018
La guerra no es un fenómeno estático, cambia, evoluciona, se adapta a las nuevas realidades; vivimos en un mundo con enorme dependencia de las tecnologías de la información y la telecomunicación, nuevos actores surgen y amenazan la seguridad de los ...
Javier Alejandro Guayara Arciniegas
doaj   +1 more source

Teacher‐makers and teacher‐breakers: (Re)defining how status and safety influence trajectories into and away from teaching

open access: yesBritish Educational Research Journal, EarlyView.
Abstract This paper uses empirical data from a longitudinal qualitative study conducted with aspirant teachers in England to propose (re)definitions of the concepts of ‘status’ and ‘safety’ as a framework with which to understand and improve teacher recruitment.
Emily MacLeod
wiley   +1 more source

Bioethics and counterculture: the Biopunk and DIYBio ethics

open access: yesRevista Colombiana de Bioética, 2019
Transhumanism coexists with humanity. The present reflection analyzes the Biopunk, a countercultural movement that breaks with the traditional ways of investigating Big Science. That frames his investigative management in the DIYBio ethic —Do It Yourself,
Luis Felipe Ramírez-Gil
doaj   +1 more source

Hacker education and empowerment: sharing pathways and experiences [PDF]

open access: yes, 2018
Este trabalho discute a congruência entre cultura hacker e educação, com olhares para o estabelecimento de um ecossistema de empoderamento. Parte da compreensão de educação a partir de uma abordagem emancipadora, com olhar para as desigualdades sociais ...
García Aguado, Alexandre   +1 more
core  

Soft hairy warped black hole entropy

open access: yes, 2017
We reconsider warped black hole solutions in topologically massive gravity and find novel boundary conditions that allow for soft hairy excitations on the horizon.
Grumiller, Daniel   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy