|
Showing 1 - 3 of
3 matches in All Departments
This book explores how Malaysia, as a multicultural modern nation,
has approached issues of nationalism and regionalism in terms of
physical expression of the built environment. Ever since the
nation's post-Colonial era, architects and policy makers have
grappled with the theoretical and practical outcomes of creating
public architecture that effectively responds to traditions,
nationhood and modernity. The authors compile and analyse
prevailing ideas and strategies, present case studies in
architectural language and form, and introduce the reader to
tensions arising between a nationalist agenda and local
'regionalist' architectural language. These dichotomies represent
the very nature of multicultural societies and issues with
identity; a challenge that various nations across the globe face in
a changing environment. This topical and pertinent volume will
appeal to students and scholars of urban planning, architecture and
the modern city.
Today, the more network connections that a company has, the more
likely that an outsider finds out a way to intrude the network. Use
of remote access and wireless networks might deploy against the
network. Organizations that use any one of these are twice as
likely to have detected attempts to penetrate their network as
those do not. One of the countermeasures that is taken to lessen
security penetration, is the antivirus, which should be named a
malware scanner as it can detect different malware including worms
and Trojans, not only viruses. This study is evaluating of the
efficiency of scanners and designs an empirical comparison between
them. Installing a scanner on a PC means consuming computer
resources, so measuring the impact on the machine performance was
the 1st step, then exploring the scanner features including the
free additional services was the 2nd step. The 3rd one was to move
on and test how fast it scans the machine, including, a quick scan,
and then the last one was investigating how good it detects
malicious samples. The interesting results have shown that there is
a remarkable disparity between what scanners vendors claim and the
real ability of the scanners.
|
|