Search results for "Security"
showing 10 items of 1693 documents
Testbed implementation of the meta-MAC protocol
2016
The meta-MAC protocol is a systematic and automatic method to dynamically combine any set of existing MAC protocols into a single higher layer MAC protocol. We present a proof-of-concept implementation of the meta-MAC protocol by utilizing a programmable wireless MAC processor (WMP) on top of a commodity wireless card in combination with a host-level software module. The implementation allows us to combine, with certain constraints, a number of protocols each represented as an extended finite state machine. To illustrate the combination principle, we combine protocols of the same type but with varying parameters in a wireless mesh network. Specifically, we combine TDMA protocols with all po…
EL SISTEMA DE PROTECCIÓN AL MENOR EN ESPAÑA:
2019

 La legislación recientemente aprobada a nivel nacional en materia de protección a la infancia y la adolescencia requiere, desde el punto de vista socioeducativo, analizar tanto sus principales aportaciones y novedades como, también y sobre todo, las exigencias a las que los profesionales de dicho ámbito hemos de dar respuesta. El análisis documental de dichos textos, así como de la literatura científica al respecto, nos ha permitido detectar que, sin duda, son numerosos los retos que se dibujan en el horizonte y diversas las posibilidades que se plantean. Es amplio y largo el camino que queda por recorrer si realmente pretendemos contribuir al bienestar de los menores y adolescentes …
Introducing History of Mathematics Education Through Its Actors: Peter Treutlein’s Intuitive Geometry
2018
This paper deals with the questions why and how to introduce into teacher education the history of teaching practices and educational reforms. In particular, we are interested in the developments of curricular school geometry during the 19th century and the reforms at the beginning of the last century in Germany. The life and work of Peter Treutlein—a contemporary of Felix Klein—and a conceptual reformist of geometry instruction, schoolbook author, committed teacher and school principal with educational experience of many years opens to us many opportunities to link present teaching practices in Geometry to its traditions, some of which we will discuss.
CREATING A POSITIVE WORKING ENVIRONMENT FOR TEACHERS
2018
The purpose of the research paper is to study a positive working environment importance for teachers work satisfaction and the role of principal in improving working conditions. Whereas teacher profession is subject to different changes and reforms it makes the whole profession and teacher well-being an important subject to discuss.The research paper includes analysis of the theoretical material about physical environment as well as psychological (also called microclimate). Empirical part is based on teacher’s survey – 97 teachers from different schools in Riga were involved. The statements of survey have partially adopted from Teaching and Learning International Study TALIS 2013. The main …
Policing in the Slovak Republic: The Organization and Current Problems of Police Work
2013
The Police hold one of the most important roles within the modern society from the viewpoint of providing and maintaining peace, order and security. In the Slovak Republic the police have been in existence for a relatively short time, but legislation regulating their activities and structure has already undergone several reforms. This treatise contains information regarding the structure and tasks of the Police of the Slovak Republic, discusses the development of criminality within the Slovak Republic, and analyses the current social status of the Police.
Higher education graduates' employment and the uncertainty of working life.
2012
The aim of this chapter is to examine how the uncertainty and instability of working life is reflected in Finnish polytechnic graduates’ employment. The present study investigates the fields of business and engineering by comparing two graduate cohorts. The societal context in which new graduates enter working life is that of an increasing precariousness in the labour market, which affects higher education graduates as well as the general population. Nowadays, a higher education qualification is not necessarily a guaranteed path to a high income and high social status as it used to be. Insecurity and uncertainty in society and working life can be considered as general features of late moder…
Honeypot utilization for analyzing cyber attacks
2016
Honeypot systems are an effective method for defending production systems from security breaches and to gain detailed information about attackers' motivation, tactics, software and infrastructure. In this paper we present how different types of honeypots can be employed to gain valuable information about attacks and attackers, and also outline new and innovative possibilities for future research.
Internet – Technical Development and Applications
2009
Internet technologies and systems are nowadays the key enablers of digital economy and modern world-wide connected society. This contributed book is a collection of cautiously chosen articles delivered by specialists with significant level of expertise in the domain of Internet technical foundations and its applications. The content of the book is divided into three parts: Internet - technical fundamentals and applications Information management systems Information security in distributed computer systems This book is a reference tool prepared for scientists and other persons involved in designing, implementation and evaluation of internet technologies. Its readers can be found among resear…
Tailorable Representation of Security Control Catalog on Semantic Wiki
2018
Selection of security controls to be implemented is an essential part of the information security management process in an organization. There exist a number of readily available information security management system standards, including control catalogs, that could be tailored by the organizations to meet their security objectives. Still, it has been noted that many organizations tend to lack even the implementation of the fundamental security controls. At the same time, semantic wikis have become popular collaboration and information sharing platforms that have proven their strength as an effective way to distribute domain-specific information within an organization. This paper evaluates…
Security Implications of Using Third-Party Resources in the World Wide Web
2018
Modern web pages have nothing in common with the static connotation coming from the word “page” - it is a dynamic unique experience created by active content and executed within browser, just-in-time assembled from various resources hosted on many different domains. Active content increases attack surface naturally exposing users to many novel threats. A popular security advice has been to deploy active content blocker plugins like NoScript, unfortunately they are not capable to effectively stop the attacks. Content Security Policy (CSP) can be effective against these attacks, but we demonstrate how poor decisions made by website administrators or external resource hosters can render CSP in…