سبد خرید

راه های حفظ امنیت اطلاعات

در سال های اخیر واژه امنیت اطلاعات میزان قابل توجهی رشد کرده و مورد توجه مردم و سران مملکت قرار گرفته است. هر چیزی که باعث شود بتوانیم اطلاعاتمان را از دسترسی افراد غیرمجاز به آن حفظ کنیم را امنیت اطلاعات می گویند. سران مملکت، دولت ها، شرکت ها ، بیمارستان ها ، مراکز نظامی و سایر شغل ها در مورد کارکنان، موجودی شرکتشان ,محصولاتشان و غیره اطلاعات محرمانه ای دارند که اگر این اطلاعات به دست رقیبشان بیافتد باعث ورشکستگی ،خسارات مالی و ضرر های زیادی در جنبه های گوناگون برای آنها می شود به همین دلیل سعی در حفظ آن دارند.

استفاده از کامپیوترهای شخصی و شبکه‌های کامپیوتری و به دنبال آن اینترنت که (بزرگترین شبکه جهانی) است، امروزه مورد استفاده زیادی بوده است. استفاده‌کنندگان کامپیوتر برای استفاده از مزایای فناوری اطلاعات و ارتباطات، باید اصول و روش های خاصی را رعایت کنند تا در این تله نیافتند.

کاربردهای مختلف علوم کامپیوتر

هدف از رشته ی کامپیوتر چیست؟!

یکی از دستگاهی که به وسیله ی آن می توان محاسبه ی عددی انجام داد کامپیوتر است. در واقع علوم کامپیوتر یکی از کلاسیک ترین رشته ها در گروه رشته های کامپیوتر است که بر آن تاکید بسیاری می کند تحصیل در علوم کامپیوتر نیاز به خلاقیت بالایی دارد به خصوص در امر برنامه نویسی شامل زمینه های مختلف رایانش از جمله الگوریتم ها ,زبان های برنامه نویسی ,نظریه ها و معماری کامپیوتر می شود رشته ای که با تغییرات مداوم و رشد سریع همراه است.

هدف از این رشته :

1) انجام دادن محاسبات با بیشترین دقت

2) دست یابی به بهترین الگوریتم ها جهت حل مسائل با کمترین زمان ممکن بوده است.

Networking

You can test the termination of a long 10Base2 network without having to hunt for the ends of the cable. Simply use an ohmmeter and test the resistance between the central conductor and the shield of any BNC T-connectors (after removing the cable from the network card to which it is attached). If the reading is about 25 ohms, the cable is properly terminated; if the reading is about 50 ohms, one of the terminators is loose or missing. If the cable appears to be properly terminated but network problems persist, remove one of the terminators and use the ohmmeter to test the connection to the T-connector that you exposed. If the result is less than 50 ohms, you probably have a short in the cable; if it is more than 56 ohms, there is probably a loose T-connector somewhere on the network.

HISC: A computer architecture using operand descriptor

Computing has been evolved from number crunching to today’s cloud. Data are no longer numbers but information which needs to be appropriately guarded and easily transportable, but the original von Neumann instruction model does not support them architecturally. This led us to start a new architecture named HISC (High-level Instruction Set Computer), to attach attributes to individual operand on instruction for effective and efficient processing of today’s computing. HISC instruction consists of an operation code (opcode), and an index to source or destination operand referenced by an operand descriptor, which contains value and attributes for the operand. The value and attributes can be accessed and processed in parallel with execution stages, introducing zero or low clock cycle overheads. Object-oriented programming (OOP) requires strict access control for the data. The JAVA model, jHISC, executes Java object-oriented program not only faster than software JVMs but has less cycles-per-instruction than other hardware Java processors. We also propose future extensions for operand descriptor beyond OOP.

Internet-based CBT for social phobia and panic disorder in a specialised anxiety clinic in routine care: Results of a pilot randomised controlled trial

Ample studies have demonstrated that internet-based cognitive behavioural therapy (iCBT) for anxiety disorders is effective and acceptable in controlled settings. Studies assessing the clinical effectiveness of iCBT for anxiety disorders among routine care populations are, however, not as numerous. The purpose of this study was to assess the effectiveness of iCBT among anxiety patients, who were on a waiting list for intensive outpatient treatment, in a specialised routine care clinic.1 A randomised controlled pilot trial was conducted. Recruited patients were on a waiting list and had a primary diagnosis of either social phobia or panic disorder. Participants were randomised into either receiving iCBT with minimal therapist contact (received access to the programme FearFighter® (FF) and received support from a clinician via telephone) or no treatment (stayed on the waiting list). The primary outcome was selfreported symptomatic change of anxiety on Beck Anxiety Inventory (BAI). The secondary outcomes were comorbid depression measured on Beck Depression Inventory (BDI-II) and quality of life measured with the EuroQol one-item visual-analogue scale (EQ-vas). All results were analysed by intention-to-treat analyses using a mixed-effects approach. N = 158 patients were assessed for eligibility of which N = 67 met all eligibility inclusion criteria, signed informed consent forms, and were randomised. Post-treatment assessment was completed by N = 47 (70%)

درحال بارگذاری ...