• Question-Oriented Multi Docu- ment Summarization

    Question-Oriented Multi Docu- ment Summarization

    Sử dụng mạng ngữ nghĩa (Tri thức miền) Wordnet Wikipedia Phân tích chủ đề Hidden topic Phân tích chủ đề bằng Wordnet - Sử dụng các tri thức miền(Ontology) tương ứng với từng chủ đề cụ thể để tăng cường ngữ nghĩa

     17 p dnulib 08/01/2013 346 1

  • Question-Oriented Multi Docu- ment Summarization

    Question-Oriented Multi Docu- ment Summarization

    Sử dụng mạng ngữ nghĩa (Tri thức miền) Wordnet Wikipedia Phân tích chủ đề Hidden topic Phân tích chủ đề bằng Wordnet - Sử dụng các tri thức miền(Ontology) tương ứng với từng chủ đề cụ thể để tăng cường ngữ nghĩa

     17 p dnulib 08/01/2013 334 1

  • JAVASCRIPT

    JAVASCRIPT

    When HTML was first developed, Web pages were static Static Web pages cannot change after the browser renders them HTML and XHTML could only be used to produce static documents. JavaScript Client-side scripting language that allows Web page authors to develop interactive Web pages and sites csehui.wordpress.com Computer Science & Engineering JavaScript and Client-Side Scripting LOGO Client-side scripting:  Scripting...

     71 p dnulib 06/12/2012 379 1

  • HTML BASIC

    HTML BASIC

    FUNDAMENTAL HTML Tags: HTML markup tags are usually called HTML tags HTML tags are keywords surrounded by angle brackets like HTML tags normally come in pairs like and The first tag in a pair is the start tag, the second tag is the end tag. Start and end tags are also called opening tags and closing tags. FUNDAMENTAL HTML Document = Web Page HTML documents describe web pages, it contain HTML tags and plain text Structure of the web...

     32 p dnulib 06/12/2012 392 1

  • Document Object Model (DOM)

    Document Object Model (DOM)

    The Document Object Model is a platform- and language-neutral interface that will allow programs and scripts to dynamically access and update the content, structure and style of documents. window document event frame document anchor applet class element embeb ID history location navigator screen form button check box hidden password radio reset select submit text textarea image layer link plug-in style tag...

     30 p dnulib 06/12/2012 300 1

  • CASCADING STYLE SHEETS CSS

    CASCADING STYLE SHEETS  CSS

    Cascading Style Sheets enable you to control the style and layout of a web page. They will enable you to specify link styles, fonts, margins, tables, colors, sizes, alignments and much more throughout your entire web page. They can also be used to create a template like style sheet (stored within a separate file) that can be used throughout your web site. You can simply link to your style sheet within each of your web pages and have the...

     39 p dnulib 06/12/2012 292 1

  • Introduction to Design Patterns in C#

    Introduction to Design Patterns in C#

    This is a practical book that tells you how to write C# programs using some of the most common design patterns. It also serves as a quick introduction to programming in the new C# language. The pattern discussions are structured as a series of short chapters, each describing a design pattern and giving one or more complete working, visual example programs that use that pattern. Each chapter also includes UML diagrams illustrating how the...

     424 p dnulib 26/11/2012 308 1

  • Hacking Webservers

    Hacking Webservers

    The hacker who say they are sticking up for WikiLeaks and Julian Assange continued to filx their digital muscles on Thursday, extending outages at Mastercard.com and Visa.com to a second day. And even as the group claiming responsibility for the attacks openly discussed big new targets like Amazon, Twitter, and Facebook, Twitter took unsuccessful steps to disperse the virtual mob. Meanwhile, published reports say a 16 year old was...

     73 p dnulib 20/11/2012 333 1

  • Session Hijacking

    Session Hijacking

    session hijacking is the exploitation of a valid computer session—sometimes also called a session key—to gain unauthorized access to information or services in a computer system. In particular, it is used to refer to the theft of a magic cookie used to authenticate a user to a remote server. It has particular relevance to web developers, as the HTTP cookies used to maintain a session on many web sites can be easily stolen by an...

     64 p dnulib 20/11/2012 280 1

  • Social Engineering

    Social Engineering

    Social engineering là phương pháp phi kỹ thuật đột nhập vào hệ thống hoặc mạng công ty. Đó là quá trình đánh lừa người dùng của hệ thống, hoặc thuyết phục họ cung cấp thông tin có thể giúp chúng ta đánh bại bộ phận an ninh. Social engineering là rất quan trọng để tìm hiểu, bởi vì hacker có thể lợi dụng tấn công vào yếu tố con người và phá...

     75 p dnulib 20/11/2012 341 1

  • Viruses and Worms

    Viruses and Worms

    Worm: A program that makes copies of itself; for example, from one disk drive to another, or by copying itself using email or another transport mechanism. The worm may do damage and compromise the security of the computer. It may arrive in the form of a joke program or software of some sort. - Symantec Security Response Glossary Virus: A program or code that replicates; that is, infects another program, boot sector, partition sector, or...

     82 p dnulib 20/11/2012 372 1

  • Trojans and Backdoors

    Trojans and Backdoors

    Trojans and Backdoors are sorts of Bad-wares which their main purpose is to send and receive data and especially commands through a port to another system. This port can be even a well-known port such as 80 or an out of regular ports like 7777. The Trojans are most of the time defaced and shown as a legitimate and harmless application to encourage the user to execute them. The main characteristic of a Trojan is that first it should be...

     98 p dnulib 20/11/2012 339 1

Hướng dẫn khai thác thư viện số