Results 61 to 70 of about 3,958 (183)
zLinux: Access Control inside Mainframes
The author describes singularities arising during access control in IBM System z and zLinux environment. The article provides appropriate requirements to protect zLinux and options that meet such requirements and are based on existing experience.
Andrey Michaylovich Kanner
doaj
It is shown that formation of the planned cost price of finished goods of steel production of RUP«BMZ»by mean of the module of controlling system SAPR/3 – one of the most effective administrative tools at the current stage of market relations.
S. N. Astratov
doaj +1 more source
Sino-African Philosophy: A Re-“Constructive Engagement” [PDF]
“Constructive-Engagement” is a meta-philosophical and meta-methodological “strategy” suggested by Chinese and comparative philosophy scholar Bo Mou for analyzing and enriching philosophical exchange.
DOTTIN, Paul A.
core +1 more source
Ensuring the visibility and traceability of items through logistics chain of automotive industry based on AutoEPCNet Usage [PDF]
Traceability in logistics is the capability of the participants to trace the products throughout the supply chain by means of either the product and/or container identifiers in a forward and/or backward direction.
Beneš, Filip +7 more
core +2 more sources
Die aard van wetgewende diskresies by die Suid-Afrikaanse uitvoerende gesag [PDF]
This article focuses on the nature of legislative discretions in the hands of the executive authority of the state.Relevant concepts are analysed, followed by an exposition of the position regarding delegation of legislative authority to the executive ...
L J van Rensburg
core
Fotogrammetria sempre più da vicino
Fotogrammetria sempre più da ...
Renzo Carlucci
doaj +2 more sources
Linux: About Trusted Boot Loader’s Startup
The paper is about terminus “trusted startup” in the context of Linux operating systems and default Linux boot loaders. The author describes necessity of additional configuration in Linux boot loaders in order to provide trusted OS startup.
Andrey Mikhailovich Kanner
doaj
Congress, for example, takes inappropriate advantage of the tremendous deference given by courts to its constitutional powers to raise and support Armies, to provide and maintain a Navy, and to make Rules for the Government and Regulation of the land and
Mazur, Diane H.
core +1 more source
Features of the Test Automation Software-Hardware Data Protection Tools
The author discusses the various types of testing in terms of automation of this process, the advantages and disadvantages of automated testing, as well as ways and especially its application to software-hardware data protection.
Tatiana Mikhailovna Borisova
doaj
Progetto PEDROS - Perimetrazione automatica di incEndi con DRone equipaggiato con sensOre Specifico
The proposed system provides for the development of a SAPR system (Airborne Remote Pilotage System) which can be of assistance to the detailed perimeter, of wooded areas attacked by insects/pathogens and/or by forest fires in order to transmit to the ...
ALMA SISTEMI
doaj +4 more sources

