1 resultado para Benign Hypercalcemia
em Research Open Access Repository of the University of East London.
Filtro por publicador
- AMS Tesi di Dottorato - Alm@DL - Università di Bologna (14)
- AMS Tesi di Laurea - Alm@DL - Università di Bologna (1)
- ArchiMeD - Elektronische Publikationen der Universität Mainz - Alemanha (3)
- Archivo Digital para la Docencia y la Investigación - Repositorio Institucional de la Universidad del País Vasco (3)
- Aston University Research Archive (1)
- B-Digital - Universidade Fernando Pessoa - Portugal (2)
- Biblioteca Digital da Produção Intelectual da Universidade de São Paulo (68)
- Biblioteca Digital da Produção Intelectual da Universidade de São Paulo (BDPI/USP) (9)
- Biblioteca Digital de Teses e Dissertações Eletrônicas da UERJ (10)
- BORIS: Bern Open Repository and Information System - Berna - Suiça (136)
- Boston University Digital Common (1)
- Brock University, Canada (8)
- Bucknell University Digital Commons - Pensilvania - USA (1)
- Cambridge University Engineering Department Publications Database (4)
- CentAUR: Central Archive University of Reading - UK (29)
- Chinese Academy of Sciences Institutional Repositories Grid Portal (23)
- Cochin University of Science & Technology (CUSAT), India (8)
- Collection Of Biostatistics Research Archive (1)
- Comissão Econômica para a América Latina e o Caribe (CEPAL) (2)
- Corvinus Research Archive - The institutional repository for the Corvinus University of Budapest (1)
- Dalarna University College Electronic Archive (1)
- DI-fusion - The institutional repository of Université Libre de Bruxelles (4)
- Digital Commons - Michigan Tech (1)
- DigitalCommons@The Texas Medical Center (7)
- DigitalCommons@University of Nebraska - Lincoln (3)
- Doria (National Library of Finland DSpace Services) - National Library of Finland, Finland (1)
- Duke University (4)
- eResearch Archive - Queensland Department of Agriculture; Fisheries and Forestry (3)
- Greenwich Academic Literature Archive - UK (3)
- Helda - Digital Repository of University of Helsinki (29)
- Hospital Prof. Dr. Fernando Fonseca - Portugal (1)
- Indian Institute of Science - Bangalore - Índia (12)
- Lume - Repositório Digital da Universidade Federal do Rio Grande do Sul (4)
- National Center for Biotechnology Information - NCBI (2)
- Plymouth Marine Science Electronic Archive (PlyMSEA) (1)
- Portal de Revistas Científicas Complutenses - Espanha (2)
- QUB Research Portal - Research Directory and Institutional Repository for Queen's University Belfast (74)
- Queensland University of Technology - ePrints Archive (91)
- RCAAP - Repositório Científico de Acesso Aberto de Portugal (1)
- ReCiL - Repositório Científico Lusófona - Grupo Lusófona, Portugal (2)
- Repositorio Académico de la Universidad Nacional de Costa Rica (1)
- Repositório do Centro Hospitalar de Lisboa Central, EPE - Centro Hospitalar de Lisboa Central, EPE, Portugal (4)
- Repositório Institucional da Universidade de Aveiro - Portugal (3)
- Repositório Institucional UNESP - Universidade Estadual Paulista "Julio de Mesquita Filho" (295)
- Research Open Access Repository of the University of East London. (1)
- RUN (Repositório da Universidade Nova de Lisboa) - FCT (Faculdade de Cienecias e Technologia), Universidade Nova de Lisboa (UNL), Portugal (1)
- Scientific Open-access Literature Archive and Repository (1)
- Universidad Autónoma de Nuevo León, Mexico (1)
- Universidad del Rosario, Colombia (13)
- Universidade Federal do Pará (13)
- Universidade Federal do Rio Grande do Norte (UFRN) (14)
- Universitat de Girona, Spain (2)
- Université de Lausanne, Switzerland (5)
- Université de Montréal, Canada (13)
- University of Michigan (7)
- University of Queensland eSpace - Australia (7)
Resumo:
A computer system's security can be compromised in many ways—a denial-of-service attack can make a server inoperable, a worm can destroy a user's private data, or an eavesdropper can reap financial rewards by inserting himself in the communication link between a customer and her bank through a man-in-the-middle (MITM) attack. What all these scenarios have in common is that the adversary is an untrusted entity that attacks a system from the outside—we assume that the computers under attack are operated by benign and trusted users. But if we remove this assumption, if we allow anyone operating a computer system—from system administrators down to ordinary users—to compromise that system's security, we find ourselves in a scenario that has received comparatively little attention.