APLICAÇÃO DA FILOSOFIA KAIZEN EM UMA EMPRESA DO RAMO DE SEGURANÇA ELETRÔNICA

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Uma Ontologia para Gestão de Segurança da Informação

This article presents some problems of knowledge management in management information security organizations and suggests ontologies as part of solving these problems. The article describes the construction of a specific ontology for information security using the methodology NeOn and discusses the use of this ontology in the management information security environment. Resumo. Este artigo apre...

متن کامل

Difusão de conhecimentos geocientíficos por meio de web-mapping: ensaio de aplicação temática com geoturismo em uma região da borda leste da bacia do Paraná

The dissemination of geoscience knowledge through Web-Mapping: thematic geotourism application essay in a region of Eastern border of the Parana Sedimentary Basin. The purpose of this study was to use a Web-mapping application based on geoscientific data to construct a basis for dissemination and consultation focused on geotourism. The studied area is located between parallels 22 o 00 '/ 22 ° 4...

متن کامل

Estudo de Caso de Mineração de Dados Multi-Relacional: Aplicação do Algoritmo ConnetionBlock em um Problema da Agroindústria

This paper presents a case study of multi-relational data mining using the ConnectionBlock algorithm, applied to the database of a sugar mill. The algorithm handles multiple tables not explicitly correlated but which influence one another according to the semantics of the data involved. The experiment revealed very interesting and useful patterns that are not found using traditional algorithms....

متن کامل

Segurança em Redes-em-Chip: Conceitos e Revisão do Estado da Arte

Networks-on-Chip (NoCs) aim at meeting the communication scalability required by Systems-on-Chip (SoCs), which are computing systems integrated into a single chip. As well as traditional distributed systems, a SoC and its network are susceptible to attacks to their security properties. This paper presents a survey that was conducted in order to identify the techniques that have been applied to ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Revista Univap

سال: 2016

ISSN: 2237-1753,1517-3275

DOI: 10.18066/revistaunivap.v22i40.1524