نتایج جستجو برای: protecting it against threats such as materialism

تعداد نتایج: 7161161  

Today governments face a threat by cyber attacks capable of disrupting communicative, economic and vital services that cause severe damages and losses. It has been years that Islamic republic of Iran benefits from cyberspace in different military and civilian sectors. Sensitive national centers such as nuclear facilities and Ministry of Oil have been targeted by individuals, groups and governme...

Journal: :Int. Arab J. Inf. Technol. 2015
Seyyed Amir Asghari Hassan Taheri

Computer Systems which operate in space environment are Subject to different radiation phenomena that lead to soft errors and can cause unpredictable behaviours of computer-based systems. Commercial Off-The Shelf (COTS) equipment which is commonly used in space missions cannot tolerate some threats such as Single Event Upsets (SEU). Therefore, there are some considerations in resisting this equ...

2000

What is common to dualists is the view that some mental properties are properties no entirely physical thing could have. According to a substance dualist, certain mental properties that people have are properties that nothing that had any physical properties could have. Thus there are two different sorts of thing that do not overlap: things that have mental properties, and physical things. A pr...

2014
Eun Byol Koh

The term BYOD(Bring Your Own Device) collectively refers to the related technologies, concepts and policies, where employees do works by accessing corporate’s internal IT resources, such as database and applications, using their personal mobile devices like smart phones, laptop computers and tablet PCs. As operational convenience has improved with the advent of a new IT environment, such as BYO...

Journal: :CoRR 2016
Nethra Balasubramanian

One of the main challenges faced by a user today is protecting their privacy, especially during widespread surveillance. This led to the development of privacy infrastructures whose main purpose is to guarantee users privacy. However, they are being misused by attackers who consider them to be an exploitable resource to perform illegitimate activities. This paper proposes to analyze and assess ...

2017
Tom Inglesby Anita Cicero

Events in the United States and internationally have shown the kinds of great stakes and consequences that often follow epidemics and disasters. Consider the series of health security shocks since 2001: National fear during the anthrax letters events, with impact on all 3 branches of the US government. The respiratory transmissible SARS and MERS viruses spreading via airplanes and hospitals, so...

Journal: :Journal of the American Geriatrics Society 2021

2017
Siegfried Zepf

The author questions the extent to which Freud's theory of culture can justify Freud’s postulated claim concerning the social causation of neuroses. Since the premises on which Freud bases his cultural theory are untenable, it is argued that this justification cannot be supplied by it. This is followed by an examination of Freud’s arguments against historical materialism, and a further reasoned...

1998

The global estimated loss to counterfeiting is expected to exceed U.S.$1.5 trillion in 2009. Counterfeiting impacts all businesses in all markets, from Gucci handbags to computer chips to proprietary algorithms. The threats to companies’ intellectual property (IP) grow as the global supply chain becomes increasingly complex. Security and protection in the global supply chain is critical to main...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید