نتایج جستجو برای: it security
تعداد نتایج: 2952360 فیلتر نتایج به سال:
the purpose of this research is to examine the effect of the islamic awakening in the arabic countries of the middle east and north africa on israeli ontological security and, it's strategy ofclosure and deviationin the regional level. in other words, after occurrence of the developments, the ontological security and identity of israel faced with what challenges? this research argues that ...
Information and communication service providers (ICSP) that are significant in size and provide Internet-based services take administrative, technical, and physical protection measures via the information security check service (ISCS). These protection measures are the minimum action necessary to secure the stability and continuity of the information and communication services (ICS) that they p...
Information and communication service providers (ICSP) that are significant in size and provide Internet-based services take administrative, technical, and physical protection measures via the information security check service (ISCS). These protection measures are the minimum action necessary to secure the stability and continuity of the information and communication services (ICS) that they p...
For organizations, the protection of information is of utmost importance. Throughout the years, organizations have experienced numerous system losses which have had a direct impact on their most valuable asset, information. Organizations must therefore find ways to make sure that the appropriate and most effective information security controls are implemented in order to protect their critical ...
security is fundamental right and prerequisite of upgrade welfare and health of the people. sense of security is the key issues in any society and necessary introduction for the political and social military life. sense of security was related citizens' mental sense of security and hence it accompanies many queries and issues around self about secure or insecure of it. women's are vulnerable gr...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید