نتایج جستجو برای: security
تعداد نتایج: 178415 فیلتر نتایج به سال:
The insecurity of cloud leads to loss or exposure vital information thereby threatens online transactions. These unfortunate happenings resulted in financial loss, reduced patronage services and investment diversions. Therefore, this chapter assesses security electronic transaction security. adopts qualitative research method, data were sourced secondarily through content analysis edited books,...
The purpose of this study is theoretical and methodological substantiation, deepening of conceptual provisions and development of scientific and practical recommendations for the formation of an integrated sector of national security and defense based on the principles of national resilience. The relevance of this study is due to the need to build national resilience to address the main problem...
Abstract This article takes into consideration cyber security economics to understand whether and is a partnership among equals or any of these two disciplines have the upper hand. Cyber more than just computer science, studies in holistic way, it dynamic cross disciplinary matter involving psychology, forensic, sociology, etc. The argument that there no clear definition cybersecurity, apart fr...
This article presents the key insights about the environment and security links in the context of the Persian Gulf region. This research paper focuses on the challenge of finding a balance among development, armed conflicts and environmental degradation in the Persian Gulf region. Environmental security challenges are human security, sustainable development and regional cooperation in the Persi...
To evaluate and predict component-based software security, a two-dimensional model of software security is proposed by Stochastic Petri Net in this paper. In this approach, the software security is modeled by graphical presentation ability of Petri nets, and the quantitative prediction is provided by the evaluation capability of Stochastic Petri Net and the computing power of Markov chain. Each...
Background and Objective: Information security is of vital importance in most organizations. This is especially central in academic libraries due to the specific type of visitors, exchange and transfer of information to the users. Thus, the purpose is to investigate the relationship of the development of library software and information security management in the libraries of Islamic Azad Uni...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید