APLICAÇÃO DA FILOSOFIA KAIZEN EM UMA EMPRESA DO RAMO DE SEGURANÇA ELETRÔNICA
نویسندگان
چکیده
منابع مشابه
Uma Ontologia para Gestão de Segurança da Informação
This article presents some problems of knowledge management in management information security organizations and suggests ontologies as part of solving these problems. The article describes the construction of a specific ontology for information security using the methodology NeOn and discusses the use of this ontology in the management information security environment. Resumo. Este artigo apre...
متن کاملDifusão de conhecimentos geocientíficos por meio de web-mapping: ensaio de aplicação temática com geoturismo em uma região da borda leste da bacia do Paraná
The dissemination of geoscience knowledge through Web-Mapping: thematic geotourism application essay in a region of Eastern border of the Parana Sedimentary Basin. The purpose of this study was to use a Web-mapping application based on geoscientific data to construct a basis for dissemination and consultation focused on geotourism. The studied area is located between parallels 22 o 00 '/ 22 ° 4...
متن کاملAdoção de normas de segurança da informação em Institutos de Pesquisas no setor público: uma proposta de análise explorando as possibilidades da Teoria Institucional
متن کامل
Estudo de Caso de Mineração de Dados Multi-Relacional: Aplicação do Algoritmo ConnetionBlock em um Problema da Agroindústria
This paper presents a case study of multi-relational data mining using the ConnectionBlock algorithm, applied to the database of a sugar mill. The algorithm handles multiple tables not explicitly correlated but which influence one another according to the semantics of the data involved. The experiment revealed very interesting and useful patterns that are not found using traditional algorithms....
متن کاملSegurança em Redes-em-Chip: Conceitos e Revisão do Estado da Arte
Networks-on-Chip (NoCs) aim at meeting the communication scalability required by Systems-on-Chip (SoCs), which are computing systems integrated into a single chip. As well as traditional distributed systems, a SoC and its network are susceptible to attacks to their security properties. This paper presents a survey that was conducted in order to identify the techniques that have been applied to ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Revista Univap
سال: 2016
ISSN: 2237-1753,1517-3275
DOI: 10.18066/revistaunivap.v22i40.1524