نتایج جستجو برای: the model has identified security management
تعداد نتایج: 16571764 فیلتر نتایج به سال:
determination of uranium in natural water and complex solutions using ion exchange chromatography: a combined procedure using ion exchange chromatography and uv-vis spectrophotometry techniques has been developed to measure uranum in natural water and complex solutions. after conditicing , one hundred milli liters of sample solutions have been passed through an ion exchange column,pachked with ...
in recent years, many security threats have entered into the organizations’ information and changed the organizational performance resulting in their exorbitant costs. this question is of particular importanceabout government agencies that use information and internet systems. this issue enabled the top managers of organizations to implement a security system and minimize these costs. using in...
the present research was an attempt to see how quranic lexical collocations were translated into english by two professional translators namely, abdullah yusuf(2005), and muhammad s. shakir(2012). the study attempted qualitatively to shed light on how translators dealt with quranic lexical collocations when transferring them to the target language based on the newmark(1988) model , and quantit...
today, information technology outsourcing (ito) has developed and caused organizations to become more flexible and dynamic than they were before. the ever-increasing development of ict is one of the main reasons for the promotion of outsourcing. that is due to the fact that many organizations are not able to adapt their hardware and software in accordance with the fast-paced technology developm...
the current study examined iranian undergraduate efl students’ willingness to communicate with regard to their vocabulary knowledge. in general, participants were somewhat willing to communicate in english. the total mean score of 730 university students’ perception of willing to communicate was 83.53 out of 135. results, regarding four parts of willingness to communicate, revealed that part...
هدف تحقیق حاضر بررسی تاثیر نشانه های فرا گفتمان متنی بر فهم متون انگلیسی به وسیله ی زبان اموزان فارسی زبان است.این تحقیق علاوه بر این کوشیده است تا میزان اگاهی این زبان اموزان و نحوه ی تعامل انان را با متون خوانده شده در زبان انگلیسی به وسیله ی پرسش نامه ی تهیه شده بررسی کند.بر اساس محتوای یک متن انگلیسی یازده سوال درست /غلط طرح گردید و یک مرتبه با ان متن و یک مرتبه با نسخه ای که نشانه ها...
growing demands and requires of high data rate systems cause significant increase of high frequency systems for wideband communication applications. as mixers are one of the main blocks of each receivers and its performance has great impact on receiver’s performance; in this thesis, a new solution for ku-band (12-18 ghz) mixer design in tsmc 0.18 µm is presented. this mixer has high linearity a...
cloud computing is a new discussion in enterprise it. it has already become popular in terms of distributed technology in some companies. it enables managers to setup and run the intended businesses by avoiding excessive spending on computers, software and hiring expert staff, which proves to be cost effective. cloud computing also helps users pay for the it services without spending massive am...
in the name of allah , the compassionate the merciful abstract shath ( blasphemic utterace made during spiritual ) is a complicated concept that deserves reflection in gnosticism and sufism ( mysticism ) and estem and westem scholars have alwaya paid attention to it. although principal essence of gnostic belief is the holy divine law ,gnosticism has pure and unique thoughts . by glancing at t...
Risk management is one of the most prominent concepts which has recently been brought into sharp focus regarding security issues in computer networks. Scientifically speaking, risk in the field of network security is a generalized matter leading the organization to the provision of resolutions which target resources and profits of the organization. This paper has discussed what methods are ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید