Javascript is disabled. Please enable it for better working experience.

Showing results for : Symbian Mobile OS

About 10 results ( 0,27 seconds)

Os And Security: Pam, Iptables, Tcp Wrappers, Kerberos, Ssh Protocol, Tripwire
http://www.researchomatic.com/Os-And-Security-Pam-Iptables-Tcp-Wrappers-Kerberos-Ssh-Protocol-Tripwire-110013.html

osystems developed and has not significantly changed. 1997 published the Open Group a preliminary specification, called X / Open Single Sign-on Service (XSSO). PAM is now on AIX , HP-UX , Solaris , Linux , FreeBSD , NetBSD , Mac OS X and Dr...

Apple Os Security
http://www.researchomatic.com/Apple-Os-Security-149737.html

Apple Company keeps on reinventing and improving itself because of the competition provided by the other big companies of the industry (Robbins & Barnwell, 2006, pp. 108). Such intensive competition highlights that the companies who keep on...

Mobile Marketing
http://www.researchomatic.com/Mobile-Marketing-1041.html

mobile phones, digital music players, and handheld Internet access devices. As the number of such devices is multiplying, subscriptions to services offered through these devices are expanding.’ The number of such subscriptions worldwide gre...

Ecc And Mobile Transactions
http://www.researchomatic.com/Ecc-And-Mobile-Transactions-1191.html

ECC to secure the transactions. Problem Statement A telephone company providing services in kenya and a apart of vodaphone they have a service known as m-pesa where people without bank accounts use their mobile phone to purchase services an...

Mobile Phone Usage
http://www.researchomatic.com/Mobile-Phone-Usage-1986.html

mobile phones more and more sophisticated, but simple, easy to use, and therefore popular. Today mobile phones are common as stereos or cameras. Children use them to catch up on the latest gossip. Parents use them to track their children an...

Strategic Management - Indian Mobile Industry
http://www.researchomatic.com/Strategic-Management-Indian-Mobile-Industry-7399.html

strategic direction for the company to grow with its products in this market. Environmental Analysis of Mobile Phone Industry No doubt, use of mobile phones has reached saturation levels or maturity in most developed countries. In other wor...

Security Analysis Mobile Adhoc Networks
http://www.researchomatic.com/Security-Analysis-Mobile-Adhoc-Networks-12363.html

security in MANET is hard to achieve due to the vulnerability of the link, the limited physical protection of the nodes, and the absence of a certification authority or centralized management point. The existing security proposals in ad hoc...