Results 61 to 70 of about 3,958 (183)

zLinux: Access Control inside Mainframes

open access: yesБезопасность информационных технологий, 2014
The author describes singularities arising during access control in IBM System z and zLinux environment. The article provides appropriate requirements to protect zLinux and options that meet such requirements and are based on existing experience.
Andrey Michaylovich Kanner
doaj  

FORMATION OF PLAN COST OF READY PRODUCTS OF STEEL PRODUCTION RUP «BMZ» BY MEANS OF MODULE CONTROLLING OF SYSTEM SAP R/3

open access: yesЛитьë и металлургия, 2011
It is shown that formation of the planned cost price of finished goods of steel production of RUP«BMZ»by mean of the module of controlling system SAPR/3 – one of the most effective administrative tools at the current stage of market relations.
S. N. Astratov
doaj   +1 more source

Sino-African Philosophy: A Re-“Constructive Engagement” [PDF]

open access: yes, 2019
“Constructive-Engagement” is a meta-philosophical and meta-methodological “strategy” suggested by Chinese and comparative philosophy scholar Bo Mou for analyzing and enriching philosophical exchange.
DOTTIN, Paul A.
core   +1 more source

Ensuring the visibility and traceability of items through logistics chain of automotive industry based on AutoEPCNet Usage [PDF]

open access: yes, 2016
Traceability in logistics is the capability of the participants to trace the products throughout the supply chain by means of either the product and/or container identifiers in a forward and/or backward direction.
Beneš, Filip   +7 more
core   +2 more sources

Die aard van wetgewende diskresies by die Suid-Afrikaanse uitvoerende gesag [PDF]

open access: yes, 1999
This article focuses on the nature of legislative discretions in the hands of the executive authority of the state.Relevant concepts are analysed, followed by an exposition of the position regarding delegation of legislative authority to the executive ...
L J van Rensburg
core  

Fotogrammetria sempre più da vicino

open access: yesGEOmedia, 2015
Fotogrammetria sempre più da ...
Renzo Carlucci
doaj   +2 more sources

Linux: About Trusted Boot Loader’s Startup

open access: yesБезопасность информационных технологий, 2013
The paper is about terminus “trusted startup” in the context of Linux operating systems and default Linux boot loaders. The author describes necessity of additional configuration in Linux boot loaders in order to provide trusted OS startup.
Andrey Mikhailovich Kanner
doaj  

Military Values in Law [PDF]

open access: yes, 2007
Congress, for example, takes inappropriate advantage of the tremendous deference given by courts to its constitutional powers to raise and support Armies, to provide and maintain a Navy, and to make Rules for the Government and Regulation of the land and
Mazur, Diane H.
core   +1 more source

Features of the Test Automation Software-Hardware Data Protection Tools

open access: yesБезопасность информационных технологий, 2013
The author discusses the various types of testing in terms of automation of this process, the advantages and disadvantages of automated testing, as well as ways and especially its application to software-hardware data protection.
Tatiana Mikhailovna Borisova
doaj  

Progetto PEDROS - Perimetrazione automatica di incEndi con DRone equipaggiato con sensOre Specifico

open access: yesGEOmedia, 2023
The proposed system provides for the development of a SAPR system (Airborne Remote Pilotage System) which can be of assistance to the detailed perimeter, of wooded areas attacked by insects/pathogens and/or by forest fires in order to transmit to the ...
ALMA SISTEMI
doaj   +4 more sources

Home - About - Disclaimer - Privacy