Criminal Sanctions Against Electronic Intrusion

Author(s):  
Irini E. Vassilaki

The international dimension of intrusion is discussed in this chapter along with the different legislative approaches adopted by various countries leading to the development of computer specific-legislation concerning electronic intrusion in a rather homogeneous style approach. The integrity of information and computer systems is presented and the misuse of devices, the illegal interception of data transfer and the illegal access to computer systems are bounded so to demonstrate the responsibility of providers or users.

Author(s):  
Katarzyna Świerczewska-Pietras

A condition for building up companies’ potential in the period of dynamic economic development is creating solutions which influence their competitiveness. In the era of new technologies – in which time plays a crucial role in the contact with clients, sale of services or data transfer – computers, the Internet and technologically advanced computer systems supporting enterprise management are becoming an indispensable element of the functioning of the SME sector.


Author(s):  
M.F. Schmid ◽  
R. Dargahi ◽  
M. W. Tam

Electron crystallography is an emerging field for structure determination as evidenced by a number of membrane proteins that have been solved to near-atomic resolution. Advances in specimen preparation and in data acquisition with a 400kV microscope by computer controlled spot scanning mean that our ability to record electron image data will outstrip our capacity to analyze it. The computed fourier transform of these images must be processed in order to provide a direct measurement of amplitudes and phases needed for 3-D reconstruction.In anticipation of this processing bottleneck, we have written a program that incorporates a menu-and mouse-driven procedure for auto-indexing and refining the reciprocal lattice parameters in the computed transform from an image of a crystal. It is linked to subsequent steps of image processing by a system of data bases and spawned child processes; data transfer between different program modules no longer requires manual data entry. The progress of the reciprocal lattice refinement is monitored visually and quantitatively. If desired, the processing is carried through the lattice distortion correction (unbending) steps automatically.


1982 ◽  
Vol 21 (04) ◽  
pp. 181-186 ◽  
Author(s):  
M. A. A. Moussa

A drug information system (DARIS) has been created for handling reports on suspected drug reactions. The system is suitable for being run on desktop computers with a minimum of hardware requirements: 187 K read/write memory, flexible or hard disc drive and a thermal printer. The data base (DRUG) uses the QUERY and IMAGE programming capabilities for data entry and search. The data base to statistics link program (DBSTAT) enables data transfer from the data base into a file for statistical analysis and signalling suspected adverse drug reactions.The operational, medical and statistical aspects of the general population voluntary adverse drug reaction monitoring programme—recently initiated in the State of Kuwait—are described.


Author(s):  
B. G. Shadrin ◽  
◽  
D. E. Zachateyskiy ◽  
V. A. Dvoryanchikov Dvoryanchikov ◽  
◽  
...  

2014 ◽  
Vol 1 (1) ◽  
pp. 9-34
Author(s):  
Bobby Suryajaya

SKK Migas plans to apply end-to-end security based on Web Services Security (WS-Security) for Sistem Operasi Terpadu (SOT). However, there are no prototype or simulation results that can support the plan that has already been communicated to many parties. This paper proposes an experiment that performs PRODML data transfer using WS-Security by altering the WSDL to include encryption and digital signature. The experiment utilizes SoapUI, and successfully loaded PRODML WSDL that had been altered with WSP-Policy based on X.509 to transfer a SOAP message.


1979 ◽  
Vol 26 (4) ◽  
pp. 413-424 ◽  
Author(s):  
D. Garth Taylor ◽  
Kim Lane Scheppele ◽  
Arthur L. Stinchcombe
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document