with their existing database, G market can use this source to CRM. This procedure will explained in the following parts.
3.2 ISP& ESCROW&SSL
To ensure the security of E-commerce, G market provides some security program for transaction. This is represented by ISP, ESCROW service. Also, there is a SSL protocol that is used to protect the private information and credit card information.
us to study harder and make us feel the joy of learning number theory.
2. main subject
1) ElGamal Cryptosystem
ElGamal Cryptosystem is invented by T. ElGamal in 1985 and its security is based on the difficulty of finding discrete logarithms modulo a large prime in a finite field. In other words, it is difficult to determine the private key a from the public key (p, r, b). A disadv
private lives. Emotional communication based on a keen interest, sympathy and consideration has positive effect on the level of employee satisfaction and growth of production. It is a kind of virtuous circle. As a result, emotional communication helps companies achieve sustained growth.
Many companies choose enterprise SNS as a means of communication between workers. Enterprise social networking
Private Equity : 총자산 할당의 17%
Domestic venture capital and buyout funds
- premier 회사들과의 오랜 유대관계
- Value added approach에 의한 투자
- Incentive 적절히 조정하는 회사 선정
Yale과 타 대학 포트폴리오와의 차이점
- P.E 에 타 대학 대비 20% 초과 투자
- Top-flight 회사들에 집중 투자
PE산업의 변화
1. List and describe the security controls
and weaknesses at TJX Companies
TJX used Wired Equivalent Privacy (WEP) encryption system which was easy for hackers to attack. Furthermore, TJX had neglected to install firewalls and data encryption on many of the computers in the wireless network. Besides, TJX transmitted credit card details to banks without encryption, violating credit card com