Down the 2011 Open Source CMS Market Share Report from water&stone. This is the 4th annual report of the industry's leaders, laggards and systems to watch. 62 pages. Over 30 exhibit. Lead analyst: Ric Shreves.
This study sought to investigate the relationship existing between laboratory facility availability and students’ academic performance in Biology across Secondary School in Ethiope East L.G.A., of Delta State, Nigeria. In the course of this study, three research questions were developed and three null hypotheses were formulated. The study used was delimited to senior secondary schools two (SSII) because it is at this stage students are being exposed to practical activities that require the usage of laboratory facilities and equipment. A descriptive survey design was used while the sample of the study was made up of one hundred and three (103) respondents. The study employed a questionnaire as an instrument to gather data.
R. Boardman, and M. Sasse. Proceedings of the SIGCHI conference on Human factors in computing
systems, CHI, volume 6 of CHI Letters, page 583 - 590. ACM Press, New York, (2004)
A. Boran, D. O'Sullivan, and V. Wade. Proceedings of the Workshop on the First Industrial Results of Semantic Technologies (FIRST2007) at ISWC/ASWC2007, Busan, South Korea, (November 2007)
C. Ya. (2007-03)Sprache: unknown ; Beziehungen: Ya, Cui (2007) A Case Study On Carrefour China. Masters thesis, Multimedia University. ; Dokumenttyp: Thesis ; Dokument-ID: oai:generic.eprints.org:1232 ; Quelldatenbank: BASE.
Y. Yang, and J. Pedersen. Proceedings of the Fourteenth International Conference on Machine Learning, page 412--420. San Francisco, CA, USA, Morgan Kaufmann Publishers Inc., (1997)
M. Oumard, D. Mirza, J. Kroy, and K. Chorianopoulos. Proceedings of the 3rd international conference on Digital Interactive Media in Entertainment and Arts - DIMEA '08, page 142--148. New York, New York, USA, ACM Press, (2008)
D. Iyobor, B. Ola, and E. Sarkodie. IJIRIS:: International Journal of Innovative Research in Information Security, Volume VII (Issue VII):
69-75(August 2020)1. Adepoju, S. A.&AlhassanS. (2010). Challenges of ATM use and fraud occurrences in Nigeria: A case study of selected banks in Minna metropolis. Journal of Online Banking and Business, 15 (2), 1-10. 2. Adeoye, O. (2012). Evaluate the performance of two-factor authentication solutions in the banking sector. International Journal of Computer Science, 9 (4), 457-462. 3. Alblawi, U. Moon I., Kim, J., Suh, S.C. & Lee, W. (2014). A hybrid classifier with classification a binning for network application identification. Journal of Integrated Design and Operations Science, 18 (3), 3-22, 4. Banerjee, U.,Vashishtha, A.&Saxena M. (2010). Wireshark function evaluation as an intrusion detection tool. International Journal of Computer Applications, 6 (7), 1-5. https://Doi:10.5120/1092-1427. 5. Brunner, A., Decressin, J., Hardy, D., &Kudela, B. (2004). The German Banking System of Three Pillars: The European Transnational Perspective. Washington, DC: International Monetary Fund. 6. Chavalone, S. (2012). Banking fraud and ATM security. Retrieved from (Accessed 10th August, 2020) http://resources.infosecinstitute.com/bank-fraud-atm-security/. 7. Cisco Networking Academy. (2017). Basics of steering and switching. Hoboken, New Jersey: Cisco Press, 2017. 8. Debnath, R. Agrawal, B.&Vishnav, C. (2014). DES, AES, and Triple DES: Symmetric Key Cryptography Algorithms. International Journal of Scientific, Engineering and Technical Research, 3 (3), 652-654 9. Firewall. (Nd) Oxford Life Dictionary of the English Language. Retrieved from (Accessed 10th August, 2020) https://en.oxforddictionaries.com/definition/firewall. 10. Hussain, M. S. Russell, A.H.&RobidasL.C. (2015). Review of ATM services in Dhaka City for an analysis of factors affecting customer satisfaction. Journal of Business and Management IOSR, 17 (11) 1, 68-75. 11. Khan, F. (2015). How does an ATM machine work? Retrieved fromwww.quora.com/How-does-an-ATM-machine-work-1 12. Modern Ghana. (2013). Federal prosecutors say hackers stole $ 45 million in ATM card fraud. Retrieved from www.modernghana.com/news/463043/1/hackers-steal-45-million-in-atm-card-scam-Federal.html 13. Regular old phone service. (No date). On Wikipedia. Retrieved from (Accessed 10th August, 2020). https://en.wikipedia.org/wiki/Plain_old_telephone_service 14. Prodromo, A. (2019). TLS Security 6: Examples of TLS Attacks and Attacks. (Accessed 10th August, 2020) Taken from https://www.acunetix.com/blog/articles/tls-vulnerabilities-attacks-final-Part/143-153 15. Pymnts.com. (2017). Automated teller machines in the US have recently grown. Retrieved from https://www.pymnts.com/cash/2017/atmia-says-us-atms-finally-see-growth/(Accessed 10th August, 2020) 16. Robam, A., Verma, and A. And Singh A. (2013). A method for detecting beams using beam sniffing. International Journal of Computer Science and Engineering, 4 (3), 21-33. https://Doi:10.5121/ijcses.2013.4302. 17. Sidel, R. (2015). Debit card data theft from ATMs escalated. Retrieved from www.wsj.com/articles/theft-of-debit-card-data-from-atms-soars-1432078912(Accessed 10th August, 2020). 18. Payment Card Forensic Analysis: From Concept to Desktop and Mobile Analysis Tools. Digital Survey, 11 (3), 143-153. TechTarget Network. (Nada). What is Ethernet? Retrieved from. (Accessed 10th August, 2020). https://searchnetworking.techtarget.com/definition/Ethernet 19. TechTarget Network. (n.d). What is a local area network (LAN)? Retrieved from (Accessed 10th August, 2020)www.searchnetworking.techtarget.com/definition/local-area-network-LAN 20. Twum, F., Nti, IK, & Asante, M. (2016). Use multi-factor authentication to improve ATM security. International Journal of Science and Engineering Applications, 5 (3), 126-134. https://Doi:10.7753/ijsea0503.1003. 21. Wireshark. (No date). In Techopedia. Retrieved from www.techopedia.com/definition/25325/wireshark (Accessed 10th August, 2020) 22. Young, C. (2019). Introduce ZOMBIES POODLE and GOLDENDOODLE. Retrieved from https: (Accessed 10th August, 2020) //www.tripwire.com/zh-CN/state-of-security/vulnerability-management/zombie- 23. Zou Lin, Liao Ming, Yuan Cheng, Zhang Hai (2017). Use the expected packet size to detect low-speed DDoS attacks. Security and Communications Network, 2017 (1), 1-14. https://Doi:10.1155/2017/3691629.
D. Rosca, S. Greenspan, M. Feblowitz, and C. Wild. Requirements Engineering, 1997., Proceedings of the Third IEEE International Symposium on, (January 1997)
C. Lampe, N. Ellison, and C. Steinfield. CSCW '06: Proceedings of the 2006 20th anniversary conference on Computer supported cooperative work, page 167--170. New York, NY, USA, ACM, (2006)
N. Agrawal, W. Bolosky, J. Douceur, and J. Lorch. Proc. of the 5th USENIX conference on File and Storage Technologies (FAST), Berkeley, CA, USA, USENIX Assoc., (2007)
J. Douceur, and W. Bolosky. Proc. of the ACM International Conference on Measurement and Modeling of Computer Systems (SIGMETRICS), page 59--70. ACM Press, (1999)