Web-service authorization for local network users
?he main authorization methods for the web used to develop and build the logical structure of sites. Justification of the method of secure integration of users of a local network into web authorization, the ability to log in with personal local data.
Подобные документы
Study the history of the development of high-tech equipment to help people in case of natural disasters. The description of creating a rescue robot with wireless control sensor. Its main advantages: high noise immunity and low power consumption.
???????????, добавлен 23.02.2016New cross-layer scheduling algorithm to quality of service. The modern methods for improving bit error and throughput program for the management of resources. The assessment of service quality, modulation and coding scheme in the resource block.
??????, добавлен 26.06.2016Android operating system security. Analysis and processing of personal data. Ways to overcome security protection. Analysis of existing systems determines the level of danger. Encryption with a public-key. Structure, components of Android applications.
???????????, добавлен 27.01.2015Analysis of existing methods and means of remote work with breadboard Arduino. The advantages of the Tinkercad Internet service in comparison with other tools of remote work. The service capability for microprocessor systems design has been considered.
??????, добавлен 23.07.2023Find and analysis a way for data protection when a person uses e-platforms. Based on the General Data Protection Regulation, the measure for the data protection is assumed to comply when data systems go along with technical and organizational safeguards.
??????, добавлен 13.08.2023Reducing the amount of required memory, reducing the time for data processing and reducing the number of copies of documents when updating information in the automation process. Analysis of the choice of technologies for application development.
??????, добавлен 31.08.2022Assistive computer programs are one of the most invaluable technologies for people who are blind: category of inclusive software can be effectively utilized for both educational purposes, enabling its users to work with windowed graphical user interfaces.
??????, добавлен 15.09.2020Development of new ways to ensure the security of data transmission through telecommunication networks. Hardware protection of information from unauthorized access. Organization of hidden channels of common use. The method of authentication of images.
??????, добавлен 29.11.2016?????????????? ??????? ?????? "A???" ?? ?????? ????????? ?? ??????????? ???????, ?? ????????? ?????????? ??????? ??? ?????? ?? ???????? ?????????. ???-????????? ????????. ??????? ????????? (create) ??????? "users" ?? ??????? ??????????? ?????????? ??.
??????, добавлен 16.02.2022Familiarity with the basic principles of cryptographic protection of information. Cryptography as a set of methods for data transformation, aimed at, it is to make the data useless to the enemy. Analysis of the cryptographic algorithm with the public key.
?????, добавлен 08.03.2014- 111. Methods of traffic regulation and user reputation handling in the bittorrent peer-to-peer Networks
Methods for regulating traffic and handling user reputation in the context of BitTorrent networks. An overview of various methods for calculating user reputation in networks and methods for differentiating the quality of service based on them.
??????, добавлен 03.12.2020 Practical acquaintance with the capabilities, configuration of firewalls. Information security in computer systems. Identify and control applications. The addition of security devices. Regular inspections of all users, regardless of location or device.
???????????? ??????, добавлен 17.03.2016This book introduces ssl and tls, and provides the essential context for both. Web security and electronic commerce and creation of ssl. History of ssl and its transformation into tls. The relationship of ssl to other network security technologies.
?????, добавлен 08.03.2014In primary order to satisfy the users' requirements for the productivity and efficiency of tasks implementation the grid-system should implement the effective algorithm of tasks distribution between the computing resources accessible at the moment.
??????, добавлен 07.12.2016??????? ??????? Data Mining, ??? ??????? ?????????????. ??????? ?????????????? ??????????. ????????? ??????????, ????????? ???????? ? Data Mining. ???????? ?????????? ??? ?????? ??????? ? 1960-? ?. Data Mining ??? ????? ????? ?????????????? ??????????.
???????, добавлен 14.01.2015Search for numerical encoding methods for lossless binary message. Consideration of methods for compressing digital data using binomial coefficients. Using the decomposition of the Bernoulli information source and calculating the maximum value of entropy.
??????, добавлен 02.10.2024Theoretical and methodological research based on big data. Social consequences caused by inequality in access to data. Ethical issues arising from the collection and analysis of large data sets. Application of big data analytics in various research areas.
??????, добавлен 11.03.2025Theoretical aspects of the "Manuskryptorium" that enables easy access to informational resources, including written archival documents. Highlight and analyzed some issues on technical capabilities of users as well as aspects of a single electronic.
??????, добавлен 27.07.2016?????? ??? ?????? MySQL ? ???? ????????? PHP. ???? ?????????????? ???????? HTML. ???????? ??????? ???????? Web-??????? (??? ?????????? HTML). JavaScript ? ????? ???? ??????. ??????? "reg users" ? "reg login attempt". ???????? ???????????????? ????.
???????? ??????, добавлен 22.05.2015- 120. Big Data
??????????? ??????? "Big Data" ? ??? ?????????? ? ?????? ? ??????????? ????????? ?????? ? ?????????????? ???????. ??????????? ???????? ?????????? ????????? ?????????? ??????????. ???????? ??????? ???????? ?????? ? ?????????? Big Data ? ?????? ????????.
???????? ??????, добавлен 28.09.2015 - 121. National cyber security system of Ukraine: perspectives of policy development and capacity building
The main need is to build a national cybersecurity system that will allow Ukraine to counter current cyber threats to its security, stability and prosperity. Characteristics of identifying the main problems that hinder the further development of NCSS.
??????, добавлен 03.12.2020 The author conducted work on identifying the role of computer lexicography in improving the quality of work of users of electronic dictionaries in particular translators and foreign language learners. Made conclusions about the advantages of dictionaries.
??????, добавлен 20.10.2022Analysis of various methods and strategies for scaling the fintech API to solve the problems of financial applications. The principles of distributing traffic between multiple servers to improve their performance. Asynchronous data processing methods.
??????, добавлен 14.12.2024Using C ++ Builder to create a binary file. The development of a dynamic array structure of the binary data using the individual functions, located in the library user. The general analysis of the data. Create screensaver with information about the task.
???????? ??????, добавлен 13.07.2014???????? ??????? "Big Data", ???????????? ??????? ???????? ???????? ?????? ??? ??????????????? ??????????????. ????? ? ???????? ???? ????????? Big Data ? ??????????? ???????????? ??????????? ?????? ? ???????? ?? ???????? ???????? ????????????? ??????????.
??????, добавлен 24.02.2025
