TruSecure turns to application-based vulnerability assessment
β Scribed by Brian McKenna
- Publisher
- Elsevier Science
- Year
- 2004
- Weight
- 253 KB
- Volume
- 1
- Category
- Article
- ISSN
- 1742-6847
No coin nor oath required. For personal study only.
β¦ Synopsis
Pioneering group within information security research, education and training, offering independent expertise in a field where trust and integrity are paramount.
World-leading masters degree programmes
MSc Information Security (MSc IS) MSc Secure Electronic Commerce (MSc SEC) Taught by experts from industry and academia Over 250 students on campus MSc IS available by e-learning from
π SIMILAR VOLUMES
This paper discusses model-based monitoring as one of key steps toward building an in-process diagnostic tool for the supervisory control level in diamond turning. In particular, the concept of information-theoretic measure called cross entropy, and Kullback's principle and some of the fundamental p
Estimating log P (logarithm of "1-octanol to water" partition coefficients) as a memure of lipophilicity for organic compounds is of considerable importance in drug discovery. Several methods have been developed for this purpose, each with its own drawbacks and advantages. In this article, a systema