Lack of skilled personnel as threat to HR security of industrial enterprises

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Differential Power Analysis: A Serious Threat to FPGA Security

Differential Power Analysis (DPA) implies measuring the supply current of a cipher-circuit in an attempt to uncover part of a cipher key. Cryptographic security gets compromised if the current waveforms obtained correlate with those from a hypothetical power model of the circuit. As FPGAs are becoming integral parts of embedded systems and increasingly popular for cryptographic applications and...

متن کامل

Holistic Approach to Training of ICT Skilled Educational Personnel

The article intends to explore and estimate the possible pedagogical advantages and potential of cloud computing technology with aim to increase organizational level, availability and quality of ICT-based learning tools and resources. Holistic model of a specialist is proposed and the problems of development of a system of methodological and technological support for elaboration of cloud-based ...

متن کامل

the differential effects of debate and media analysis as relate to enhancing efl learners critical thinking ability and writing performances

critical thinking ability has an important role in education. accordingly, scholars around the world are searching for new ways for teaching and improving students critical thinking ability. in line with the studies in efl contexts supporting the positive relationship between critical thinking and writing performances, this study investigated the differential effects of halverson’s critical thi...

15 صفحه اول

Knowledge Discovery as a Threat to Database Security

This chapter investigates the affect of knowledge discovery from databases on the security of databases. First, it examines the current concern with database systems for security from knowl­ edge discovery. Second, this chapter discusses some of the potential security risks associated with knowledge discovery. Third, some potential structure for the development of controls for such systems is e...

متن کامل

Response of school personnel to student threat assessment training

This article may be used for research, teaching and private study purposes. Any substantial or systematic reproduction, redistribution , reselling , loan or sub-licensing, systematic supply or distribution in any form to anyone is expressly forbidden. The publisher does not give any warranty express or implied or make any representation that the contents will be complete or accurate or up to da...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: SHS Web of Conferences

سال: 2017

ISSN: 2261-2424

DOI: 10.1051/shsconf/20173501027