نتایج جستجو برای: protecting it against threats such as materialism
تعداد نتایج: 7161161 فیلتر نتایج به سال:
Matt Weiner Department of Philosophy University of Wisconsin, Milwaukee Abstract In Knowledge and Lotteries, Hawthorne argues for a view on which whether a speaker knows that p depends on whether her practical environment makes it appropriate for her to use p in practical reasoning. It may seem that this view yields a straightforward account of why knowledge is important, based on the role of k...
Web based applications are very common nowadays where almost every software can be accessible through a web browser in one form or the other. This paper proposes techniques to detect different threats related to web applications by using a hypervisorbased security architecture. The proposed architecture leverages the hypervisor’s visibility of the virtual machines’ runtime state and traffic flo...
Technological advancements in various industries, such as network intelligence, vehicle networks, e-commerce, the Internet of Things (IoT), ubiquitous computing, and cloud-based applications, have led to an exponential increase volume information flowing through critical systems. As a result, protecting infrastructures from intrusions security threats has become paramount concern field intrusio...
This study examines factors related to socially responsible consumption based on a sample of 636 Spanish consumers. The results indicate that socio-demographic such as sex, age, education level, and economic activity affect consumption. In addition, it was found in order assess the antecedents is necessary specify type consumer behavior (for example, purchasing specific products or initiatives ...
Over the years, the focus has been on protecting network, host, database and standard applications from internal and external threats. The Rapid Application Development (RAD) process makes the web application extremely short and makes it difficult to eliminate the vulnerabilities. Here we study web application risk assessment technique called threat risk modeling to improve the security of the ...
abstract in aggregate, active forms of reactive silica with mineral names are sometimes associated with sand and gravel in concrete mixture. alkali hydroxides originated from alkalis in the cement or other resources form an alkaline silica gel with this reactive silica which becomes swallowed and expanded during time causing damage to concrete. there have been growing researches on alkaline r...
Abstract Social movements often impose nontrivial costs on others against their wills. Civil disobedience is no exception. How can social in general, and civil particular, be justifiable despite this apparent wrong-making feature? We examine an intuitively plausible account—it fair that everyone should bear the burdens of tackling injustice. extend fairness-based argument for to defend some act...
approving the children’s protecting laws, we confront with the samples of criminal and ethic policies taken in order to keep children safe against any discrmination. taking a short brief of issues disscussed in this framework, we can recognize that the lawmakers are under the influence of children rights convention and the facts related to it. the law which is based on children abuse, brings th...
with the unfolding of recent developments in the arab world and fall of political systems in some of arab countries as well as spread of islamic thoughts, new grounds have been created for new wave of islamic awakening. it seems that this wave has become dynamic over the past few years. islamic awakening is an opportunity for realization of the ideal of palestine. the present paper is an attemp...
Today’s critical infrastructures like the Power Grid are essentially physical processes controlled by computers connected by networks. Once these systems were highly isolated and secure against most security threats. However, in recent years they evolved in several aspects that greatly increased their exposure to cyber-attacks coming from the Internet. Firstly, the computers, networks and proto...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید