... Rakshit and D. M. Monro, “Iris image selection and localiza-tion based on analysis of specular reflection,” in Proceedings ofIEEE Workshop on Signal Processing Applications for Public Se-curity and ... inner and outer iris boundaries to 256 pixels by stretching and lin-ear interpolation. In conventional iris recognition, low, and mid-frequency components are mainly used for authentica-tion instead ... ArticleA Study on Iris Localization and Recognition on Mobile PhonesKang Ryoung Park,1Hyun-Ae Park,2Byung Jun Kang,2Eui Chul Lee,2 and Dae Sik Jeong21Department of Electronic Engineering,...
... HgConcentration: Basic quantities used in defi nitions of concentration in aqueous solution are based on mass, chemical amount of substance and/ or volume and are designed by the traditional ... A narrow constriction of each tube allowed for the conven-tional separation of liquid solution and solid phase after inverting the tubes. There are two limitations in application of this ... (Zotov and Keppler, 2000; Fulton et al., 2000; Schmidt and Rickers, 2003; Bassett et al., 2000; Mayanovic et al., 2003) to study salt solubility, metal ion hydration, complexation and oxidation...
... DOES THE WEB APPLICATION REQUIRE AUTHENTICATION OF THE USER?Many Web applications require another server authenticate usersExamine how information is passed between the two serversEncrypted channelsVerify that logon and password information is stored on secure placesAuthentication servers introduce a second target443734APPLICATION VULNERABILITIES COUNTERMEASURES (CONTINUED)Top10 Web application vulnerabilities (continued)Remote administration flawsAttacker can gain access to the Web server through the remote administration interfaceWeb and application server misconfigurationAny Web server software out of the box is usually vulnerable to attackDefault accounts and passwordsOverly informative error messages3216WEB FORMSUse the <form> element or tag in an HTML documentAllows customer to submit information to the Web serverWeb servers process information from a Web form by using a Web applicationEasy way for attackers to intercept data that users submit to a Web server7APPLICATION VULNERABILITIES COUNTERMEASURESOpen Web Application Security Project (OWASP)Open, notforprofit organization dedicated to finding and fighting vulnerabilities in Web applicationsPublishes the Ten Most Critical Web Application Security VulnerabilitiesTop10 Web application vulnerabilitiesUnvalidated parametersHTTP requests are not validated by the Web serverBroken access controlDevelopers implement access controls but fail to test them properly29USING SCRIPTING LANGUAGESDynamic Web pages can be developed using scripting languagesVBScriptJavaScriptPHP18OPEN DATABASE CONNECTIVITY (ODBC) (CONTINUED)ODBC definesStandardized representation of data typesA library of ODBC functionsStandard methods of connecting to and logging on to a DBMS24WEB APPLICATION COMPONENTSStatic Web pagesCreated using HTMLDynamic Web pagesNeed special components<form> tagsCommon Gateway Interface (CGI)Active Server Pages (ASP)PHPColdFusionScripting languagesDatabase connectors6APACHE WEB SERVERTomcat Apache is another Web Server programTomcat Apache hosts anywhere from 50% to 60% of all Web sitesAdvantagesWorks on just about any *NIX and Windows platformIt is freeRequires Java 2 Standard Runtime Environment (J2SE, version 5.0)15 ON WHAT PLATFORM WAS THE WEB APPLICATION DEVELOPED?Several different platforms and technologies can be used to develop Web applicationsAttacks differ depending on the platform and technology used to develop the applicationFootprinting is used to find out as much information as possible about a target systemThe more you know about a system the easier it is to gather information about its vulnerabilities45OPEN DATABASE CONNECTIVITY (ODBC)Standard database access method developed by the SQL Access GroupODBC interface allows an application to accessData stored in a database management systemAny system that understands and can issue ODBC commandsInteroperability among backend DBMS is a key feature of the ODBC interface2348UNDERSTANDING WEB APPLICATIONSIt is nearly impossible to write a program without bugsSome bugs create security vulnerabilitiesWeb applications also have bugsWeb applications have a larger user base than standalone applicationsBugs are a bigger problem for Web applications5DOES THE WEB APPLICATION CONNECT TO A BACKEND DATABASE SERVER? (CONTINUED)Basic testing should look forWhether you can enter text with punctuation marksWhether you can enter a single quotation mark followed by any SQL keywordsWhether you can get any sort of database error when attempting to inject SQL43DOES THE WEB APPLICATION USE DYNAMIC WEB PAGES?Static Web pages do not create a security environmentIIS attack exampleSubmitting a specially formatted URL to the attacked Web serverIIS does not correctly parse the URL informationAttackers could launch a Unicode exploithttp://www.nopatchiss.com/scripts/ ... DOES THE WEB APPLICATION REQUIRE AUTHENTICATION OF THE USER?Many Web applications require another server authenticate usersExamine how information is passed between the two serversEncrypted channelsVerify that logon and password information is stored on secure placesAuthentication servers introduce a second target443734APPLICATION VULNERABILITIES COUNTERMEASURES (CONTINUED)Top10 Web application vulnerabilities (continued)Remote administration flawsAttacker can gain access to the Web server through the remote administration interfaceWeb and application server misconfigurationAny Web server software out of the box is usually vulnerable to attackDefault accounts and passwordsOverly informative error messages3216WEB FORMSUse the <form> element or tag in an HTML documentAllows customer to submit information to the Web serverWeb servers process information from a Web form by using a Web applicationEasy way for attackers to intercept data that users submit to a Web server7APPLICATION VULNERABILITIES COUNTERMEASURESOpen Web Application Security Project (OWASP)Open, notforprofit organization dedicated to finding and fighting vulnerabilities in Web applicationsPublishes the Ten Most Critical Web Application Security VulnerabilitiesTop10 Web application vulnerabilitiesUnvalidated parametersHTTP requests are not validated by the Web serverBroken access controlDevelopers implement access controls but fail to test them properly29USING SCRIPTING LANGUAGESDynamic Web pages can be developed using scripting languagesVBScriptJavaScriptPHP18OPEN DATABASE CONNECTIVITY (ODBC) (CONTINUED)ODBC definesStandardized representation of data typesA library of ODBC functionsStandard methods of connecting to and logging on to a DBMS24WEB APPLICATION COMPONENTSStatic Web pagesCreated using HTMLDynamic Web pagesNeed special components<form> tagsCommon Gateway Interface (CGI)Active Server Pages (ASP)PHPColdFusionScripting languagesDatabase connectors6APACHE WEB SERVERTomcat Apache is another Web Server programTomcat Apache hosts anywhere from 50% to 60% of all Web sitesAdvantagesWorks on just about any *NIX and Windows platformIt is freeRequires Java 2 Standard Runtime Environment (J2SE, version 5.0)15 ON WHAT PLATFORM WAS THE WEB APPLICATION DEVELOPED?Several different platforms and technologies can be used to develop Web applicationsAttacks differ depending on the platform and technology used to develop the applicationFootprinting is used to find out as much information as possible about a target systemThe more you know about a system the easier it is to gather information about its vulnerabilities45OPEN DATABASE CONNECTIVITY (ODBC)Standard database access method developed by the SQL Access GroupODBC interface allows an application to accessData stored in a database management systemAny system that understands and can issue ODBC commandsInteroperability among backend DBMS is a key feature of the ODBC interface2348UNDERSTANDING WEB APPLICATIONSIt is nearly impossible to write a program without bugsSome bugs create security vulnerabilitiesWeb applications also have bugsWeb applications have a larger user base than standalone applicationsBugs are a bigger problem for Web applications5DOES THE WEB APPLICATION CONNECT TO A BACKEND DATABASE SERVER? (CONTINUED)Basic testing should look forWhether you can enter text with punctuation marksWhether you can enter a single quotation mark followed by any SQL keywordsWhether you can get any sort of database error when attempting to inject SQL43DOES THE WEB APPLICATION USE DYNAMIC WEB PAGES?Static Web pages do not create a security environmentIIS attack exampleSubmitting a specially formatted URL to the attacked Web serverIIS does not correctly parse the URL informationAttackers could launch a Unicode exploithttp://www.nopatchiss.com/scripts/ ... DOES THE WEB APPLICATION REQUIRE AUTHENTICATION OF THE USER?Many Web applications require another server authenticate usersExamine how information is passed between the two serversEncrypted channelsVerify that logon and password information is stored on secure placesAuthentication servers introduce a second target443734APPLICATION VULNERABILITIES COUNTERMEASURES (CONTINUED)Top10 Web application vulnerabilities (continued)Remote administration flawsAttacker can gain access to the Web server through the remote administration interfaceWeb and application server misconfigurationAny Web server software out of the box is usually vulnerable to attackDefault accounts and passwordsOverly informative error messages3216WEB FORMSUse the <form> element or tag in an HTML documentAllows customer to submit information to the Web serverWeb servers process information from a Web form by using a Web applicationEasy way for attackers to intercept data that users submit to a Web server7APPLICATION VULNERABILITIES COUNTERMEASURESOpen Web Application Security Project (OWASP)Open, notforprofit organization dedicated to finding and fighting vulnerabilities in Web applicationsPublishes the Ten Most Critical Web Application Security VulnerabilitiesTop10 Web application vulnerabilitiesUnvalidated parametersHTTP requests are not validated by the Web serverBroken access controlDevelopers implement access controls but fail to test them properly29USING SCRIPTING LANGUAGESDynamic Web pages can be developed using scripting languagesVBScriptJavaScriptPHP18OPEN DATABASE CONNECTIVITY (ODBC) (CONTINUED)ODBC definesStandardized representation of data typesA library of ODBC functionsStandard methods of connecting to and logging on to a DBMS24WEB APPLICATION COMPONENTSStatic Web pagesCreated using HTMLDynamic Web pagesNeed special components<form> tagsCommon Gateway Interface (CGI)Active Server Pages (ASP)PHPColdFusionScripting languagesDatabase connectors6APACHE WEB SERVERTomcat Apache is another Web Server programTomcat Apache hosts anywhere from 50% to 60% of all Web sitesAdvantagesWorks on just about any *NIX and Windows platformIt is freeRequires Java 2 Standard Runtime Environment (J2SE, version 5.0)15 ON WHAT PLATFORM WAS THE WEB APPLICATION DEVELOPED?Several different platforms and technologies can be used to develop Web applicationsAttacks differ depending on the platform and technology used to develop the applicationFootprinting is used to find out as much information as possible about a target systemThe more you know about a system the easier it is to gather information about its vulnerabilities45OPEN DATABASE CONNECTIVITY (ODBC)Standard database access method developed by the SQL Access GroupODBC interface allows an application to accessData stored in a database management systemAny system that understands and can issue ODBC commandsInteroperability among backend DBMS is a key feature of the ODBC interface2348UNDERSTANDING WEB APPLICATIONSIt is nearly impossible to write a program without bugsSome bugs create security vulnerabilitiesWeb applications also have bugsWeb applications have a larger user base than standalone applicationsBugs are a bigger problem for Web applications5DOES THE WEB APPLICATION CONNECT TO A BACKEND DATABASE SERVER? (CONTINUED)Basic testing should look forWhether you can enter text with punctuation marksWhether you can enter a single quotation mark followed by any SQL keywordsWhether you can get any sort of database error when attempting to inject SQL43DOES THE WEB APPLICATION USE DYNAMIC WEB PAGES?Static Web pages do not create a security environmentIIS attack exampleSubmitting a specially formatted URL to the attacked Web serverIIS does not correctly parse the URL informationAttackers could launch a Unicode exploithttp://www.nopatchiss.com/scripts/...
... Propositions 17–20, measuring conical volumes.Interlude Propositions 21–2, finding proportions holding with acircle and an inscribed polygon.Section 2: Main treatiseChapter 5 Propositions 23–34, ... stretched to the limits and beyond: the mini-treatise at the end of thework relies essentially upon conic sections; the notion of the exponent is ad-umbrated in Proposition 8. Both treat geometrical ... areboth concave in the same direction and either one of them is whollycontained by the other and by the straight <line> having the samelimits as itself, or some is contained, and some...
... for the European Commission Directorate General on Health and Consumer Protection Development of indicators on consumer satisfaction and Pilot survey Contract n° B5-1000/03/000382 ... proposed methodology and the underlying model for the construction of consumer satisfaction indicators. In section 2.2 we introduce and define a number of terms and concepts. This is important ... The focus was on two main areas: o Existing (national) models and tools for consumer satisfaction indicators o Research results in relation to consumer behaviour and satisfaction measurement....
... publication. PB contributed to theconception and design of the study, revised the manu-script critically, and gave final approval for publication.SEW contributed to the conception and design ... perspective of families and children.In-depth exploration of the longer-term psychological and social impact of the election conflict on individual childrenis still needed and is ongoing within the ... purposes)IntroductionConflicts, population displacement, and the economicconsequences of disasters affect children disproportion-ately.[1] Children are more vulnerable to communicablediseases and environmental...
... and antibiotic consumption from 2001 to 2005 were analyzed retrospectively. Results: A negative correlation was observed between the ceftriaxone consumption and the prevalence of ceftriaxone ... 2. A negative correlation was observed between the ceftriaxone consumption and the prevalence of ceftriaxone resistant E.coli and Klebsiella spp. (rho:-0.395, p=0.332 and rho:-0.627, p=0.037, ... infections and fluoroquino-lone resistance: a prospective observational study. Ann Clin Microbiol Antimicrob. 2009; 24(8):27. 30. Austin DJ, Kristinsson KG, Anderson RM. The relationship between...
... of Acute Administration of an Herbal Preparation on Blood Pressure and Heart Rate in Humans John G. Seifert1, Aaron Nelson2, Julia Devonish2, Edmund R. Burke3, and Sidney J. Stohs4 ... collection. All subjects com-pleted a health history questionnaire and provided informed consent prior to participation. An uninvolved individual randomly divided subjects into two groups, 12 and ... Putzbach K, Nelson BC, et al. Certification of standard reference materials containing bitter orange. Analyt Bioanalyt Chem. 2008; 391: 2023-2034. 23. Stewart A, Fernando R, McDonald S, et al....
... skill and Syllabuses (Questions 1, 2, 3 and 9) -Students’ ways of learning speaking skill (Questions 4, 5, and 8)- Students’ opportunities and difficulties & Solutions (Questions 6, and 7)3.3.2.2. ... research contains Limitation of the study, Recommendation for further study and Conclusion.2-Teachers’ opinions of speaking activities and of students’ attitude to speaking lessons-Teachers’ ... Brown and Yule’s (1983: 127), speaking skill consists of short, fragmentary utterance, in a range of pronunciation. There is often a great deal of repetition and overlap between one speaker and...
... paper, the author presented a contrastive analysis on the concept, formulation, cultural traditional function, syntactic function and classification of simile in English and its Vietnamese equivalents. ... are told to contain three main literature functions which are perceptive function, aesthetic function and educational function. For example, the proverb Money makes the mare go demonstrates a ... (semantics containing pragmatics andon the contrary). Due to the aims and objectives of the thesis, the scope of contrastive analysis is based on the following principles and aspects: - Contrastive...
... Current Vietnamese Laws And Regulations on Environmental ProtectionI.1 The Law on Environmental ProtectionWhile Vietnam's 1992 Constitution contains references to environmental issues, a solid ... international obligations, such as the conventions on climate change, conservation of biodiversity and ozone depletion which were signed by Vietnam;• Details of EIA procedures;20IV.2.3 Environmental ... transport;• Identification of areas for which standards are to be developed, including environmental protection in production areas and construction of factories;• Import/export controls on toxic matters,...