2 Katsuya Uchida Katsuya Uchida 3 Katsuya Uchida Katsuya Uchida
|
|
- そよ あんさい
- 5 years ago
- Views:
Transcription
1
2 2 Katsuya Uchida Katsuya Uchida 3 Katsuya Uchida Katsuya Uchida
3 4 Katsuya Uchida 5 Katsuya Uchida
4 6 Katsuya Uchida 7 Katsuya Uchida
5 DNA 8 Katsuya Uchida 9 Katsuya Uchida
6 10 Katsuya Uchida Purdue Web Site 11 Katsuya Uchida
7 CS501 Introduction to Computational Science CS502 Compiling and Programming Systems CS503 Operating Systems CS510 Software Engineering CS514 Numerical Analysis CS515 Numerical Linear Algebra CS520 Computational Methods in Analysis CS525 Parallel Computing CS526 Information Security CS530 Introduction to Scientific Visualization CS531 Computational Geometry CS535 Interactive Computer Graphics CS536 Data Communication and Computer Networks CS541 Database Systems CS542 Distributed Database Systems CS543 Introduction to Simulation and Modeling of Computer Systems CS544 Simulation and Modeling of Computer Systems CS555 Cryptography CS565 Programming Languages CS569 Introduction to Robotic Systems CS572 Heuristic Problem-Solving CS574 Advanced Computer Graphics Applications CS580 Algorithm Design, Analysis, and Implementation CS584 Theory of Computation and Computational Complexity CS586 Algorithmic Robotics CS590 Topics in Computer Sciences CS590B CS590D CS590E CS590G CS590M CS590N CS590R CS590U CS603 CS614 CS615 CS626 CS635 CS636 CS638 CS641 CS650 CS655 CS661 CS662 CS668 CS690 CS690M Topics in Computational Molecular Biology Security Aspects in Distributed Systems Topical Lectures in Information Security Capturing, Modeling, Rendering 3D Structures Geometric Modeling and Graphics (tentative) Embedded Systems Design Unknown Course Title Access Control: Theory and Practice Advanced Topics in Distributed Systems Numerical Solution of Ordinary Differential Equations Numerical Solution of Partial Differential Equations Advanced Information Assurance Unknown Course Title Internetworking Multimedia Networking and Operating Systems Multimedia Database Systems Computational Aspects of Parallel Processing Advanced Cryptology Formal Compiling Methods Pattern Recognition and Decision-Making Processes Introduction to Artificial Intelligence Seminar on Topics in Computer Sciences Advanced Dynamic Memory Management 12 Katsuya Uchida CS526 : Information Security Introduction: Role of security, Types of security, Definitions. Classification Schemes, Access Control Formalisms: Information flow, Protection Models Policy: Risk Analysis, Policy Formation, Role of audit and control Formal policy models. Cryptography: Cipher methods, Key management, digital signatures Authentication and Identity System Design principles. TCB and security kernel construction, Verification, Certification issues Midterm Exam System Verification Network Security. Distributed cooperation and commit, Distributed authentication issues. Routing, flooding, spamming. Firewalls Audit Mechanisms Malicious Code: Viruses, Worms, etc. Intrusion Detection and Response Vulnerability Analysis Physical threats, operational security, Legal and Societal Issues Final Exam 13 Katsuya Uchida
8 14 Katsuya Uchida 15 Katsuya Uchida
9 16 Katsuya Uchida 17 Katsuya Uchida
10 18 Katsuya Uchida. MSISTM 19 Katsuya Uchida
11 . MSISTM 20 Katsuya Uchida 21 Katsuya Uchida
12 22 Katsuya Uchida 23 Katsuya Uchida
13 Firewalls, Perimeter Protection and VPNs IP Stimulus/Response and Fragmentation Complex IP Transports and Services TCPdump, WINdump, Ethereal and Other Sniffers Business Needs vs. Security Static Packet Filtering Stateful Packet Filtering and Inspection Proxies In-depth Coverage of Popular Firewall Products Implementing Security with Cisco Routers Intrusion Detection Centralized Logging Firewall Log File Analysis Log File Alerting IPSec, SSL, and SSH Designing a Secure Perimeter "Cool Tools Network and Host Based Auditing 24 Katsuya Uchida Intrusion Detection In-Depth TCP/IP for Intrusion Detection Intrusion Detection Using Snort TCPdump Review Introduction TCP/IP Communication Model Modes of Operation Fragmentation Writing Snort Rules ICMP Configuring Snort as an IDS Stimulus and Response Output Analysis Microsoft Networking and Security Domain Name System Routing IPsec Advanced Topics Network Traffic Analysis Using tcpdump IDS Signatures and Analysis Introduction to TCPdump Intrusion Detection Architecture Writing TCPdump Filters TCPdump Filters A Close Look at the Famous Mitnick Attack Analysis of TCPdump Output Intrusion Detection Analysis Advanced Analysis Examining Datagram Fields with Common Errors and How to Avoid Them TCPdump Traffic and Externals Analysis 25 Katsuya Uchida
14 Hacker Techniques, Exploits and Incident Handling Incident Handling Step-by-Step Computer Crime Investigation Preparation Maintaining Access Identification Covering the Tracks Containment Eradication Recovery Special Actions for Responding to Different Types of Incidents Incident Record Keeping Incident Follow-Up Putting It All Together Computer and Network Hacker Exploits Hacker Tools Workshop Reconnaissance Hands-on Installation and Analysis Scanning General Exploits Intrusion Detection System Evasion Network-Level Attacks Gathering and Parsing Packets DNS Injection Operating System and Application-Level Attacks Web Application Attacks Denial of Service Attacks Other Attack Tools and Techniques 26 Katsuya Uchida Auditing Networks, Perimeters and Systems Auditing Principles and Concepts Auditing Networks with Nmap and Other Tools - Hands-on Auditor's Role in Relation to Introduction Benefits of Various Auditing Standards Getting Started With Nmap and Certifications Mapping Your Network Basic Auditing and Assessing Strategies Analyzing The Results The Six-Step Audit Process Follow-on Activities Auditing the Perimeter Advanced Systems Audit: Windows NT/ Handson Overview Auditing to Create a Secure Configuration Detailed Audit of a Router Auditing to Maintain a Secure Configuration Testing the Firewall Auditing to Determine What Went Wrong Testing the Firewall Rulebase Testing Third Party Software Reviewing Logs and Alerts The Tools Used War Dialing War Driving Forensics Auditing Web Based Applications - Hands-on Advanced Systems Audit: Unix - Hands-on Auditing to Create a Secure Configuration Auditing to Maintain a Secure Configuration Auditing to Determine What Went Wrong Forensics 27 Katsuya Uchida
15 System Forensics, Investigations, and Response Forensic and Investigative Essentials - Hands-on Windows 2000/XP Forensics - Hands-On Incident Response and Forensics Windows Live System Examination Forensic Theory on Any Operating Systems Windows 2000 Imaging Hands-On Forensic Lab Configuration Searching for clues Registry and Information Malicious Programs Low-Level Analysis Basic Forensic Principles Illustrated with Linux - Frameworks and Best Practices: Managerial and Hands On Legal Issues Essential Forensic Tools A Framework for Forensics Concepts How to Collect and Protect Evidence - The Disk Image Legal Permissions and Restrictions on Internal Investigations of Incidents Heart of the Crime in Linux Internet Service Providers Filesystem Forensics Law Enforcement Network Forensics Analyzing a Real World Compromise Evidence Integrity The Coroner's Toolkit, TASK, and Autopsy - Advanced Forensic - Hands-on Hands-On TCT Toolkit Kernel Module Forensics TASK Toolkit Malware Dissection and Analysis Creating Timelines Advanced /proc directory breakdown Autopsy Forensic Browser Process Wiretapping The Forensic Challenge The Forensic Challenge 28 Katsuya Uchida 29 Katsuya Uchida
16 30 Katsuya Uchida 31 Katsuya Uchida
JIS Z 9001:1998JIS Z 9002:1998 ISO/IEC 17025ISO/IEC Guide 25
JIS Q 17025 IDT, ISO/IEC 17025 IT JIS Z 9001:1998JIS Z 9002:1998 ISO/IEC 17025ISO/IEC Guide 25 JIS Q 17025 IDT, ISO/IEC 17025 IT IT JIS Q 17025ISO/IEC 17025 (2) JIS Z 9358 ISO/IEC Guide 58 (3) testing
More informationCSX トレーニング環境 2019/Jan Version9 [LAB Vol1] 要素 特定 Identify 防御 Protect 検知 Detect 対応 Response 復旧 Recover 上級 14.Web アプリケーションのテスト (Testing Web Applications)
CSX トレーニング環境 2019/Jan Version9 [LAB Vol1] 14.Web アプリケーションのテスト (Testing Web Applications) 12. ブラウザ攻撃 (Browser Attacks) 15. マルウェアの解析 (Malware Analysis) 13.Secure Copy による原状復帰 (Restoring Data with Secure
More informationCisco ASA Firepower ASA Firepower
Cisco ASA Firepower ASA Firepower 1 2 3 4 1 1-1 Cisco ASA Cisco ASA Firepower Cisco ASA with Firepower Services Cisco Adaptive Security Device Manager ASDM MEMO Cisco ASA with Firepower Services Application
More information今企業が取るべきセキュリティ対策とは策
AGENDA 2 2 2002 Symantec Corporation. 70,000 (Code Red, Nimda) Number of Known Threats 60,000 50,000 40,000 30,000 20,000 DOS (Yahoo!, ebay) (Love Letter/Melissa) 10,000 (Tequila) 3 3 2002 Symantec Corporation.
More informationDesign and Implementation of Centralized Financial Management system 厦门大学博硕士论文摘要库
Design and Implementation of Centralized Financial Management system 2011 4 Internet JSP MVC JSPMVC Abstract Abstract With computer technology, network technology and information technology, more and
More informationElastic stack Jun Ohtani 1
Elastic stack Jun Ohtani 2017/12/06 @johtani 1 about Me, Jun Ohtani / Technical Advocate lucene-gosen ElasticSearch Server http://blog.johtani.info Elasticsearch, founded in 2012 Products: Elasticsearch,
More information2-20030509.PDF
JPCERT/CC 1 Firewall 2 Security Incident 3 Cgi-bin Cross Site Scripting (CSS) 4 Statistics@JPCERT/CC 3,000 2,500 2,000 1,500 1,000 500 0 1996Q4 1997 1998 1999 2000 2001 2002 Number of Reports 5 2002 JPCERT/CC
More information- Principles for a Telecommunications management network 2.0 2001 11 27 THE TELECOMMUNICATION TECHNOLOGY COMMITTEE 2 JT-M3010 ...19...20...20...20...20...21...22...23...24 3 JT-M3010 ...26...28...29...34...34...35...35...37...37...37...37...37
More informationSRX IDP Full IDP Stateful Inspection 8 Detection mechanisms including Stateful Signatures and Protocol Anomalies Reassemble, normalize, eliminate ambi
IDP (INTRUSION DETECTION AND PREVENTION) SRX IDP Full IDP Stateful Inspection 8 Detection mechanisms including Stateful Signatures and Protocol Anomalies Reassemble, normalize, eliminate ambiguity Track
More informationPDFŠp…f†[…^
DIGITAL IMAGING SYSTEM DICOM Digital Imaging and Communications in Medicine (DICOM) Part 1: Introduction and Overview NEMA Part 4 Service Class Specifications Part 3 Information Object
More information8 P2P P2P (Peer-to-Peer) P2P P2P As Internet access line bandwidth has increased, peer-to-peer applications have been increasing and have great impact
8 P2P (Peer-to-Peer) P2P P2P As Internet access line bandwidth has increased, peer-to-peer applications have been increasing and have great impact on networks. In this paper, we review traffic issues for
More information2
Copyright 2008 Nara Institute of Science and Technology / Osaka University 2 Copyright 2008 Nara Institute of Science and Technology / Osaka University CHAOS Report in US 1994 http://www.standishgroup.com/sample_research/
More informationTaro12-認定-部門-ASG101-06
JIS Q 17025(ISO/IEC 17025(IDT)) JIS Q17025(ISO/IEC 17025(IDT)) --- --- JNLA JCSS ISO/IEC 17025 JIS Q 17025 IAJapan ILAC APLAC JIS Q17011 ISO/IEC 17011 MRA ILACAPLAC MRA IAJapan (3) JNLAJCSS (4) testing
More informationVol.55 No (Jan. 2014) saccess 6 saccess 7 saccess 2. [3] p.33 * B (A) (B) (C) (D) (E) (F) *1 [3], [4] Web PDF a m
Vol.55 No.1 2 15 (Jan. 2014) 1,a) 2,3,b) 4,3,c) 3,d) 2013 3 18, 2013 10 9 saccess 1 1 saccess saccess Design and Implementation of an Online Tool for Database Education Hiroyuki Nagataki 1,a) Yoshiaki
More informationISMSクラウドセキュリティ認証の概要
Copyright JIPDEC ISMS, 2016 1 ISMS ISO/IEC 27017:2015 Copyright JIPDEC ISMS, 2016 2 JIS Q 27001(ISO/IEC 27001) ISO/IEC 27017 ISMS ISO/IEC 27017 ISO/IEC 27002 Copyright JIPDEC ISMS, 2016 3 ISO/IEC 27017:2015
More informationJapan Patent Office JPO JPO (INPIT) (INPIT) : : IPDL IPDL 7,100 7,100 AIPN AIPN INPIT INPIT IPDL 1. DB FI F PAJ (Patent Abstracts of Japan) 2. DB 3. DB FI/F AIPN (Advanced Industrial Property Network)
More informationIPSJ SIG Technical Report Vol.2009-DPS-141 No.20 Vol.2009-GN-73 No.20 Vol.2009-EIP-46 No /11/27 1. MIERUKEN 1 2 MIERUKEN MIERUKEN MIERUKEN: Spe
1. MIERUKEN 1 2 MIERUKEN MIERUKEN MIERUKEN: Speech Visualization System Based on Augmented Reality Yuichiro Nagano 1 and Takashi Yoshino 2 As the spread of the Augmented Reality(AR) technology and service,
More informationshio SA.ppt[読み取り専用]
2005 213 Rootkit 2 ...... GPG EFS Windows 3 Rootkit + ifconfig, ps, ls, login Tripwire lkm-rootkit NT Rootkit, AFX Rootkit OS 4 HD... NTFS ADS Alternate Data Stream... NTFS HD HD...
More information2008 A T1H () T1H II ,4,5 36 T1H II ,4,5 37 T1H ( ) 37 T1H T1H
2008 A syll mksyltex Ver 2.10(2009-04-15) by higaki@tu.chiba-u.ac.jp 2008 A T1H308001 2.0 2 2 5 T1Y016003 2.0 2 5 5 T1Y016004 2.0 2 5 6 T1Y016005 2.0 2 5 UEDA EDILSON SHINDI 6 T1Y016001 2.0 2 5 7 T1Y016006
More informationWindows Oracle -Web - Copyright Oracle Corporation Japan, All rights reserved.
Windows Oracle -Web - Copyright Oracle Corporation Japan, 2004. All rights reserved. Agenda Oracle Windows Windows Oracle 1 / Active Directory/Enterprise User Security 1-1 Windows 1-2 Kerberos 1-3 Enterprise
More information189 2015 1 80
189 2015 1 A Design and Implementation of the Digital Annotation Basis on an Image Resource for a Touch Operation TSUDA Mitsuhiro 79 189 2015 1 80 81 189 2015 1 82 83 189 2015 1 84 85 189 2015 1 86 87
More informationGUIDE_2013_H1
http: //www.interop.jp/ More Clouds, More Ways, More Innovations CONFERENCE PROGRAM GUIDE NW-0110:00-17:00 NW-0210:00-17:00 NW-0310:00-17:00 NH-0110:00-17:00 NH-0210:00-17:00 NH-0310:00-17:00 NC-0212:50-14:20
More information特集_03-07.Q3C
3-7 Error Detection and Authentication in Quantum Key Distribution YAMAMURA Akihiro and ISHIZUKA Hirokazu Detecting errors in a raw key and authenticating a private key are crucial for quantum key distribution
More informationOracle Application Server 10g(9
Oracle Application Server 10g (9.0.4) for Microsoft Windows J2EE Oracle Application Server 10g (9.0.4) for Microsoft Windows J2EE and Web Cache...2...3...3...4...6...6...6 OS...9...10...12...13...24...24
More information( )
NAIST-IS-MT0851100 2010 2 4 ( ) CR CR CR 1980 90 CR Kerberos SSH CR CR CR CR CR CR,,, ID, NAIST-IS- MT0851100, 2010 2 4. i On the Key Management Policy of Challenge Response Authentication Schemes Toshiya
More informationIFAC International Auditing Practice Committee Issued by the International Federation of Accountants
IFAC International Auditing Practice Committee Issued by the International Federation of Accountants Accounting estimate Accounting system Adverse opinion Agreed-upon procedures engagement Analytical
More informationスライド 1
ライフサイクルプロセスに関する国際標準とソフトウェアファクトリ ISO/IEC 15288, ISO/IEC 12207, INCOSE Handbook and IEEE Std 1517 松本吉弘 工学博士 ; IEEE Life Fellow 京都高度技術研究所 All Rights Reserved Yoshihiro Matsumoto; 2007 1 対象とした国際標準 IEEE Std
More informationPMI2005北米大会報告書
2 3 Metro Toronto Convention Center Toronto, Canada PMI PMI SIG Meeting Paper Presentation PM PM PMI 4 5 8-15 Sep. 2005, Metro Toronto Convention Center, Toronto, Canada 6 7 CEO PM 180,000 PMI BMW PMI
More informationuntitled
- 1 - - 2 - - 3 - - 4 - - 5 - - 6 - - 7 - - 8 - - 9 - ..... - 10 - - 11 - - 12 - - 13 - - 14 - - 15 - - 16 - -- - 17 - - 18 - - 19 - - 20 - - 21 - - 22 - - 23 - - 24 - - 25 - - 26 - - 27 - - 28 - - 29
More informationResearch on productivity improvement of business operations for manufacturing, distribution and health-care industries. The research on product and facility life cycle design and management is performed
More informationPowerPoint
2011 12 6PTC Live TechForum TOKYO manji@rd.denso.co.jp 1/ 52 1949 12 16 1,874 ( ) 1 9,457 3 1,315 ( ) 38,318 123,165 ( ) 2011 3 31 Gr. Gr. Gr. Gr. Gr. PF 2/ 52 1 2 3 4PMT 5 Integrity 6 7 8 1/2 3/ 52 OEM
More informationJapanese.PDF
2002 11 2 3 Part I 4 5 6 3.1WTO/TBT 2 3 6 3.2ISO/IEC 7 3.3 7 3.4 7 3.5 8 3.6 8 9 4.1 9 4.2 9 4.3 10 12 Part II 13 1.1 13 1.2 13 1.3 14 1.4 14 1.5 14 2 14 3 15 3.1 15 3.2 16 3.3 17 3.4 17 3.5 18 3.6 18
More informationTesting XML Performance
- DataPower Technology, Inc. XML Web 2003 5 DATAPOWER XML WEB - Copyright 2003DataPower Technology, Inc. All Rights Reserved. DataPower Technology, Inc. DataPower DataPower ( ) DataPower 2003 5 2/17 DATAPOWER
More informationConfiguring_01
Symantec Backup Exec Dell EqualLogic Microsoft Exchange Server SQL Server IT / / 24 365 Symantec Backup Exec Advanced Disk-based Backup Option (ADBO) Dell Equal- Logic Microsoft Exchange Server 2003 2007
More informationOracle Application Server 10g( )インストール手順書
Oracle Application Server 10g (10.1.2) for Microsoft Windows J2EE Oracle Application Server 10g (10.1.2) for Microsoft Windows J2EE and Web Cache...2...3...3...4...6...6...6 OS...9...10...12...13...25...25
More information<Documents Title Here>
Oracle Application Server 10g Release 2 (10.1.2) for Microsoft Windows Business Intelligence Standalone Oracle Application Server 10g Release 2 (10.1.2) for Microsoft Windows Business Intelligence Standalone
More informationプロダクトガイド・表1
ystem S o l u t i o n s Storage Solutions HP Solutions e-business Solutions Mechanical Computer-Aided Design Authoring Software to Create Better Product Documentation Contents Secure File Transfer Solution
More informationFirewall IDS IP IP 1 HTTP 74% Quick Search 32 bit DDMP 4 23.02 Mbps URL Filtering 59.3 Mbps i
16 Pipelined Signature Matching for Malicious Access Detection 1050371 2005 3 11 Firewall IDS IP IP 1 HTTP 74% Quick Search 32 bit DDMP 4 23.02 Mbps URL Filtering 59.3 Mbps i Abstract Pipelined Signature
More information2004 SYN/ACK SYN Flood G01P014-6
2004 SYN/ACK SYN Flood 2005 2 2 1G01P014-6 1 5 1.1...................................... 5 1.2...................................... 5 1.3..................................... 6 2 7 2.1..................................
More informationSSO Sales/Tech combined webinar template
HP Web e-speak web HP Agenda page 2 Search Engine Google Web Site www.hp.com Search Engine Yahoo Web page 3 Web Web Web page 4 CHAPTER 1 Do It Yourself CHAPTER 2 Do It For Me PC,, ITS... etc.) page 5 E-service
More information内閣官房情報セキュリティセンター(NISC)
( ) ...1 1.1.1...1 (1)..1 (2)...1 (3)...1 1.1.2...2 (1)...2 (2)...2 (3)...2 (4)...3 (5)...3 (6)...3 1.1.3...4...10 2.1...10 2.1.1...10...10...10 (1)...10 (2)... 11 (3)... 11 (4)...12 (5)...13 (6)...13
More informationWeb Microsoft 2008 R2 Database Database!! Database 04 08
Database Database Web http://www.microsoft.com/japan/sqlserver/2008/r2/solution/comparison/default.mspx Microsoft 2008 R2 Database Database!! 03 2009 6 1 Database 04 08 vs. Database 12 2008 R2 5 14! 5!
More informationZurich, CH Brussels, BE Wrocław, PO Toronto, CA Ottawa, CA Herzliya, IL Almaden, US Detroit, US Tokyo, JP Boulder, US TJ Watson, US Tokyo, JP Atlanta,
IBM IBM Zurich, CH Brussels, BE Wrocław, PO Toronto, CA Ottawa, CA Herzliya, IL Almaden, US Detroit, US Tokyo, JP Boulder, US TJ Watson, US Tokyo, JP Atlanta, US Atlanta, US Heredia, CO Haifa, IL New Delhi,
More informationIPSJ SIG Technical Report Vol.2014-EIP-63 No /2/21 1,a) Wi-Fi Probe Request MAC MAC Probe Request MAC A dynamic ads control based on tra
1,a) 1 1 2 1 Wi-Fi Probe Request MAC MAC Probe Request MAC A dynamic ads control based on traffic Abstract: The equipment with Wi-Fi communication function such as a smart phone which are send on a regular
More informationnakayama15icm01_l7filter.pptx
Layer-7 SDN SDN NFV 50 % 3 MVNO 1 2 ICM @ 2015/01/16 2 1 1 2 2 1 2 2 ICM @ 2015/01/16 3 2 Service Dependent Management (SDM) SDM Simple Management of Access-Restriction Translator Gateway (SMART-GW) ICM
More informationITSM.PDF
HP IT - ITIL / HP ITSM - - ITSM Revision-1.1 2004 Hewlett-Packard Development Company, L.P. HP IT - Current Global Deployment : 140,000 : 72Billion US$ (2002 ) Applications 5,000 Databases 7,928 PC Managed
More information4_3.dvi
Vol. 49 No. 4 1680 1691 (Apr. 2008) Malware 1, 2 1 2 DDoS Herder Malware Malware Malware A Development of the Malware Dynamic Behavior Analyzing System and BOTNET Monitoring Keiichi Horiai, 1, 2 Takafumi
More informationShonan Institute of Technology MEMOIRS OF SHONAN INSTITUTE OF TECHNOLOGY Vol. 41, No. 1, 2007 Ships1 * ** ** ** Development of a Small-Mid Range Paral
MEMOIRS OF SHONAN INSTITUTE OF TECHNOLOGY Vol. 41, No. 1, 2007 Ships1 * ** ** ** Development of a Small-Mid Range Parallel Computer Ships1 Makoto OYA*, Hiroto MATSUBARA**, Kazuyoshi SAKURAI** and Yu KATO**
More informationThe Nature of Human Intelligence Corporate Creativity- How Innovation and Improvement Actually Happen Creativity and Innovation Principia Managementa The Medici Effect: Breakthough Insights the Intersection
More informationIPSJ SIG Technical Report Vol.2015-MUS-107 No /5/23 HARK-Binaural Raspberry Pi 2 1,a) ( ) HARK 2 HARK-Binaural A/D Raspberry Pi 2 1.
HARK-Binaural Raspberry Pi 2 1,a) 1 1 1 2 3 () HARK 2 HARK-Binaural A/D Raspberry Pi 2 1. [1,2] [2 5] () HARK (Honda Research Institute Japan audition for robots with Kyoto University) *1 GUI ( 1) Python
More informationTCP/IP Internet Week 2002 [2002/12/17] Japan Registry Service Co., Ltd. No.3 Internet Week 2002 [2002/12/17] Japan Registry Service Co., Ltd. No.4 2
Japan Registry Service Co., Ltd. JPRS matuura@jprs.co.jp Internet Week 2002 [2002/12/17] Japan Registry Service Co., Ltd. No.1 TCP IP DNS Windows Internet Week 2002 [2002/12/17] Japan Registry Service
More information本文/YAZ172P
2004 2005 2006 2007 Committee of Sponsoring Organizations of Treadway Commission COSO 1992 Internal Control-Integrated Framework COSO 1 1 COSO 2009 7 27 2009 9 11 21 1956 1980 1986 MBA 1980 2006 1990 1993
More information2.1... 1 2.1.1.1... 1 (1). 1 (2)... 1 (3)... 1 2.1.1.2... 1 (1)... 1 (2)... 1 (3)... 1 2.1.1.3... 1 (1)... 1 (2)... 1 (3)... 1 2.1.1.4... 2 2.1.1.5... 2 2.2... 3 2.2.1... 3 2.2.1.1... 3... 3... 3 (1)...
More informationfx-9860G Manager PLUS_J
fx-9860g J fx-9860g Manager PLUS http://edu.casio.jp k 1 k III 2 3 1. 2. 4 3. 4. 5 1. 2. 3. 4. 5. 1. 6 7 k 8 k 9 k 10 k 11 k k k 12 k k k 1 2 3 4 5 6 1 2 3 4 5 6 13 k 1 2 3 1 2 3 1 2 3 1 2 3 14 k a j.+-(),m1
More informationCopyright
2004 Copyright 2004 Copyright 2004 2 . Copyright 2004 3 . Copyright 2004 4 Copyright 2004 5 (1) (2) (3) (4) Copyright 2004 6 ISO/IEC17799 127 JRMS Copyright 2004 7 Copyright 2004 8 Copyright 2004 9 Copyright
More informationスライド 1
FISMA 1 1 2 3 4 1 ISO/IEC 27001) (27003,27004,27007 3416 2010 2 ) IPA 5 6 7 http://csrc.nist.gov/groups/sma/fisma/index.html 8 9 (2003-2008) 2008) 10 SP 800-53 FISMA SP 800-53 GISRA FISMA 2002/12/17 SP
More information28 Docker Design and Implementation of Program Evaluation System Using Docker Virtualized Environment
28 Docker Design and Implementation of Program Evaluation System Using Docker Virtualized Environment 1170288 2017 2 28 Docker,.,,.,,.,,.,. Docker.,..,., Web, Web.,.,.,, CPU,,. i ., OS..,, OS, VirtualBox,.,
More informationスライド 1
NIST SP800 BCPContingency Contingency Planning 200621 1. IPAIPA 2. BCP/BCM 3. NIST SP800 FISMA 4. SP800-53 5. SP800-34 IT Contingency Planning Guide for Information Technology Systems IT January 2004 2
More informationOracle Application Server 10g(9
Oracle Application Server 10g(10.1.2) for Microsoft Windows Infrastructure Oracle Application Server 10g(10.1.2) for Microsoft Windows Infrastructure...2...3...4...5...7...7...7 OS...10...12...13...15...29...29
More informationMacintosh HD:Users:ks91:Documents:lect:nm2002s:nm2002s03.dvi
3 ks91@sfc.wide.ad.jp April 22, 2002 1 2 1. over IP ( : Voice over IP; IP Internet Protocol ) over IP??? : 2002/4/20 23:59 JST : http://www.soi.wide.ad.jp/report/ 3 32 11 (4/22 ) 4 () 3 2 1? 4 ...... A.C.
More informationAirMac ネットワーク for Windows
AirMac for Windows Windows XP Windows 2000 1 1 5 6 AirMac 6 7 AirMac Extreme AirMac Express 7 AirMac for Windows 7 AirMac Express 8 AirMac 9 AirTunes 9 AirMac Extreme 10 2 11 AirMac 11 AirMac 12 AirMac
More information集中講義 インターネットテクノロジー 第5回
5 ichii@ms.u-tokyo.ac.jp 2002/5/31 2 IPv6 2002/5/31 3 IPv6 32 IP 2008 streamline QoS anycast anycast: IPv6 40 128 2002/5/31 4 IP ICANN Ad Hoc Group on Numbering and Addressing McFadden/Holmes Report of
More information/07/ /10/12 I
Certificate Policy Version 1.10 2018 10 12 1.00 2018/07/24 1.10 2018/10/12 I 1.... 1 1.1... 1 1.2... 1 1.3 PKI... 2 1.3.1 CA... 2 1.3.2 RA... 2 1.3.3... 2 1.3.3.1... 2 1.3.3.2... 3 1.3.4... 3 1.3.5...
More information,,, J-SOX ISMS PCIDSS,, IM/VoIP/VoD Copyright 2008 Juniper Networks, Inc. 2
NAC Advanced Technologies Business Development Manager Toru Konno toruk@juniper.net v1.81 Copyright 2008 Juniper Networks, Inc. www.juniper.co.jp 1 ,,, J-SOX ISMS PCIDSS,, IM/VoIP/VoD Copyright 2008 Juniper
More informationOracle Database 10gのOracle Data Guard
Oracle Database 10g Oracle Data Guard 2004 Oracle Data Guard... 3... 3... 3 Oracle Data Guard... 4 Oracle Data Guard... 4 Oracle Data Guard... 4 Oracle Data Guard... 5 Oracle Data Guard... 6 Oracle Data
More informationwpEnterpriseSvr.doc
COBOLJava.NETWeb IT COBOL Micro Focus Enterprise Server Enterprise Server COBOL Enterprise Server COBOL Enterprise Server COBOL COBOL COBOL Java.NET IT Micro Focus COBOLJ2EE.NET Web COBOL Enterprise Server
More informationMicrosoft Word - sugiyama.doc
backtrack ( ) sugiyama[atmark]yamanashi.ac.jp 1. Web Linux ssh firewall firewall ( 1) Linux backtrack Debian,OpenSUSE,FreeBSD PC-UNIX PC backtrack CD USB 2. backtrack Linux ( 2) CD USB VMware 3 USB Vmware
More information1 Gumblar Fig. 1 Flow of Gumblar attack. Fig. 2 2 RequestPolicy Example of operation based on RequestPolicy. (3-b) (4) PC (5) Web Web Web Web Gumblar
DNS Web Web Request Policy Framework 1,a) 2 1 2011 11 30, 2012 6 1 Web Web Drive-by download Gumblar Web Web JavaScript Web Web Request Policy Framework Request Policy Framework Web Gumblar DNS Proposal
More informationuntitled
Studies in Human Geography 32 Geoenvironmental Sciences, Graduate School of Life and Environmental Sciences, University of Tsukuba, Japan ArcGIS Geography Network ArcGIS ArcGIS ArcGIS Geography Network
More information403-0702_‚Ofl¼
HP-UX HP System Insight Manager Whitepaper ..................................................................................2..............................................................2 SIM....................................................................................2.............................................................3................................................................................3
More information/02/ /09/ /05/ /02/ CA /11/09 OCSP SubjectAltName /12/02 SECOM Passport for Web SR
for Web SR Certificate Policy Version 2.50 2017 5 23 1.00 2008/02/25 1.10 2008/09/19 1.20 2009/05/13 5 1.30 2012/02/15 5.6 CA 1.40 2012/11/09 OCSP SubjectAltName 2.00 2013/12/02 SECOM Passport for Web
More informationMAAB でのプレゼンテーション に関する提案
J-MAAB 2005 10 27 (1) OBD (2) (3) (4) OEM (5) MAAB J-MAAB 1. MBD (Model-Based Development) MBD Process 2. MAAB MAAB 3. J (Japan) -MAAB J-MAAB 4. J-MAAB WG WG 5. MBD Virtual World *SILS Rapid *HILS Real
More informationMac OS X Server Windows NTからの移行
Mac OS X Server Windows NT 10.4 apple Apple Computer, Inc. 2005 Apple Computer, Inc. All rights reserved. Mac OS X Server Apple 1 Infinite Loop Cupertino CA 95014-2084 U.S.A. www.apple.com 163-1480 3 20
More information生物の運動を目指して
Fukuda Lab., Nagoya University Fukuda Lab., Nagoya University Robotics Generation Fukuda Lab., Nagoya University The Fourth The Third Generation The Second Generation(Service) The First Generation(Manufacturing)
More informationCisco® ASA シリーズルーター向けDigiCert® 統合ガイド
Cisco ASA DigiCert 2013 7 8 Cisco ASA VPN DigiCert : 2013 7 8 Copyright 2018 DigiCert, Inc. All rights reserved. DigiCert DigiCert DigiCert, Inc. Symantec Norton Symantec Corporation DigiCert, Inc. DigiCert,
More information"CAS を利用した Single Sign On 環境の構築"
CAS 2 SSO Authorization 1,3, 2,3, 2, 2,3 1 2 3 Central Authentication and Authorization Service (CAS 2 ) Web Application Single Sign On Authorization CAS 2 SSO/AuthZ Jan. 30 2007, p. 1/40 Plan of Talk
More information陶 磁 器 デ ー タ ベ ー ス ソ リ ュ ー シ ョ ン 図1 中世 陶 磁 器 デ ー タベ ー ス 109 A Database Solution for Ceramic Data OGINO Shigeharu Abstract This paper describes various aspects of the development of a database
More informationIP IPv4-IPv6
IPv6 Mobility IETF 2006 6 9 14:00-15:30 Interop Tokyo 2006 IIJ Nautilus6 IP IPv4-IPv6 L2 L3 Mobile IPv6 HIP L3.5 Shim6(?) L4 SCTP IPv6 Mobile IPv6/NEMO BS IETF RFC3775 - Mobile IPv6 RFC3963 - NEMO Basic
More information¥¤¥ó¥¿¡¼¥Í¥Ã¥È·×¬¤È¥Ç¡¼¥¿²òÀÏ Âè1²ó
1 2011 5 11 lumeta internet mapping http://www.lumeta.com http://www.cheswick.com/ches/map/ 2 / 43 ( ) 3 / 43 (Kenjiro Cho) WIDE 1984 ( ) OS 1993 1996 ( ) (QoS ) 2001 ( ) 2004 ( ) QoS 4 / 43 (Internet
More informationPowerPoint Presentation
インターネット Web アクセスを安全に お問い合わせ先 本資料や F5 製品に関するお問い合わせは以下までお気軽にご連絡ください メールでのお問い合わせは : http://www.f5networks.co.jp/inquiry/ お電話でのお問い合せは : 03-5114-3850 [ インサイドセールス ] 10:00 ~ 18:00 ( 土日祝日を除く ) 社員のインターネット利用 安全ですか?
More information4 14 21 37 39 47 56 64 75 77 86 95 103 112 123 137 153 2 163 173 185 203 213 217 227 228 233 241 242 244 246 248 250 253 254 256 257 259 3 14 12 4 10 2 16 46 1 15 1 15 15 15 5 10 11 6 12 13 14 15 15 16
More informationVol.54 No (June 2013) GSRAv2 1,a) 1,b) 1,c) 1,d) , IPsec-VPN SSL-VPN OpenVPN PacketiX VPN GSRA Group-based Secure Remote
GSRAv2 1,a) 1,b) 1,c) 1,d) 2012 9 21, 2013 3 1 IPsec-VPN SSL-VPN OpenVPN PacketiX VPN GSRA Group-based Secure Remote Access NAT GSRA GSRA NAT GSRAv2 GSRAv2 NAT VPN Proposal and Evaluation of GSRAv2 that
More informationWin XP SP3 Japanese Ed. NCP IPSec client Hub L3 SW SRX100 Policy base VPN fe-0/0/0 vlan.0 Win 2003 SVR /
SRX dial-up VPN (NCP ) Win XP SP3 Japanese Ed. NCP IPSec client Hub L3 SW SRX100 Policy base VPN fe-0/0/0 vlan.0 Win 2003 SVR.216 172.27.24.0/24.254.254.1.1.100 100.100.100.0/24 192.168.1.0/24 Test devices
More information(a) (b) 1 JavaScript Web Web Web CGI Web Web JavaScript Web mixi facebook SNS Web URL ID Web 1 JavaScript Web 1(a) 1(b) JavaScript & Web Web Web Webji
Webjig Web 1 1 1 1 Webjig / Web Web Web Web Web / Web Webjig Web DOM Web Webjig / Web Web Webjig: a visualization tool for analyzing user behaviors in dynamic web sites Mikio Kiura, 1 Masao Ohira, 1 Hidetake
More informationIntroduction to Information and Communication Technology (a)
Introduction to Information and Communication Technology (a) 5 th week: 1.4 Transmission, exchange and evaluation of information Kazumasa Yamamoto Dept. Computer Science & Engineering Introduction to ICT(a)
More information専攻科シラバス 一般科目
(Practical English) () 12 2 2 TOEIC TEST TOEIC 1. TOEIC TEST 2. B () 2 Unit 1 Shopping 2 Unit 2 Entertaiment Weather 2 Unit 3 Eating out 2 Unit 4 Travel 2 Unit 5 Health 2 2 Unit 6 Housing Media 2 Unit
More informationfiš„v8.dvi
(2001) 49 2 333 343 Java Jasp 1 2 3 4 2001 4 13 2001 9 17 Java Jasp (JAva based Statistical Processor) Jasp Jasp. Java. 1. Jasp CPU 1 106 8569 4 6 7; fuji@ism.ac.jp 2 106 8569 4 6 7; nakanoj@ism.ac.jp
More informationuntitled
SUBJECT: Applied Biosystems Data Collection Software v2.0 v3.0 Windows 2000 OS : 30 45 Cancel Data Collection - Applied Biosystems Sequencing Analysis Software v5.2 - Applied Biosystems SeqScape Software
More information橡セキュリティポリシー雛形策定に関する調査報告書
13 2 KM 12 7 10 ISO/IEC TR 13335 Techniques for the Management of IT Security ISO/IEC 15408 Evaluation Criteria for IT Security BS7799 A Code of Practice for Information Security Management RFC2196 Site
More information情報セキュリティの現状と課題
443 IT IT 1 1 2 3 4 1 OECD( 1992 Confidentiality Integrity Availability 2 2000.2. http://www.npa.go.jp/hightech/sec_taikei/taikei.htm 3 2000.12. http://www.kantei.go.jp/jp/it/security/taisaku/2000_1215/1215actionplan.html
More informationスライド 1
2010.2.18 CSS Nite in Ginza Vol.44 JIS X 8341-3 60 1 2004 vs 2010 2010 2 18 2010.2.18 CSS Nite in Ginza Vol.44 3 2004 10 Web Web JIS X 8341-3 W3C / WCAG 2010.2.18 CSS Nite in Ginza Vol.44 2010.2.18 CSS
More informationOracle Enterprise Manager概説 リリース2.2
Oracle Enterprise Manager 2.2 2000 11 : J02261-01 Oracle Enterprise Manager 2.2 : J02261-01 Oracle Enterprise Manager Concepts Guide, Release 2.2 A85250-01 Copyright 1996, 2000, Oracle Corporation. All
More informationOracle Identity Managementの概要およびアーキテクチャ
Oracle Identity Management 2003 12 Oracle Identity Management... 3 ID... 3 ID... 4 ID... 4 Oracle Identity Management... 5 Oracle Identity Management... 6 Oracle Identity Management... 7 ID... 8 Application
More informationOracle Change Management Pack, Oracle Diagnostics Pack, Oracle Tuning Packインストレーション・ガイド リリース2.2
Oracle Enterprise Manager Oracle Change Management Pack, Oracle Diagnostics Pack, Oracle Tuning Pack 2.2 2000 11 : J02263-01 Oracle Change Management Pack, Oracle Diagnostics Pack, Oracle Tuning Pack 2.2
More informationCP_SBA_Catalog2012_ indd
Check Point 2 3 4 5 6 7 8 9 10 11 www.checkpoint.co.jp 2003-2012 Check Point Software Technologies Ltd. All rights reserved. Check Point, AlertAdvisor, Application Intelligence, Check Point 2200, Check
More information1 Table 1: Identification by color of voxel Voxel Mode of expression Nothing Other 1 Orange 2 Blue 3 Yellow 4 SSL Humanoid SSL-Vision 3 3 [, 21] 8 325
社団法人人工知能学会 Japanese Society for Artificial Intelligence 人工知能学会研究会資料 JSAI Technical Report SIG-Challenge-B3 (5/5) RoboCup SSL Humanoid A Proposal and its Application of Color Voxel Server for RoboCup SSL
More informationA Feasibility Study of Direct-Mapping-Type Parallel Processing Method to Solve Linear Equations in Load Flow Calculations Hiroaki Inayoshi, Non-member
A Feasibility Study of Direct-Mapping-Type Parallel Processing Method to Solve Linear Equations in Load Flow Calculations Hiroaki Inayoshi, Non-member (University of Tsukuba), Yasuharu Ohsawa, Member (Kobe
More information<Insert Picture Here> Oracle Business Intelligence 2006/6/27
Oracle Business Intelligence 2006/6/27 Oracle Business Intelligence Suite Enterprise Edition Oracle Warehouse Builder 10g Release 2 Agenda BI FY07 3 Oracle Business Intelligence 2007
More informationESA_UI_1110.PDF
ESA SAP SAP SAP Web AS SAP SAP : ESA ESA : CAF ESA SAP SAP SAP : ESA ESA : CAF ESA SAP SAP SAP Office???? SAP Japan Co., Ltd. 2004, Title of Presentation / Speaker Name / 4 SAP SAP : ESA ESA : CAF ESA
More information