نتایج جستجو برای: without access to public information

تعداد نتایج: 10965083  

Purpose: As the world rapidly moves into the new era of information and wisdom, the needs of human beings to use books and libraries continue to grow. With this in mind, in addition to increasing public library services, it's important for planners to distribute library facilities equitably across the country. In this paper we will study the distribution of public libraries in the Provinces of ...

Journal: :Indian Journal of Pharmacology 2016

Journal: :Asia-Pacific Journal on Human Rights and the Law 2018

Journal: :Transportation Research Record: Journal of the Transportation Research Board 2001

Journal: :RBM: A Journal of Rare Books, Manuscripts, and Cultural Heritage 2000

2014
Bhanu Prakash Gopularam

The term data security refers to the degree of resistance of protection given to information from unintended or unauthorized access. The core principles of information security remain the same Confidentiality, Integrity and Availability also referred as CIA triad. With cloud adoption the confidential enterprise data is moved from organization premises to untrusted public network and due to this...

Journal: :College & Research Libraries 2014

پایان نامه :دانشگاه آزاد اسلامی - دانشگاه آزاد اسلامی واحد تهران مرکزی - دانشکده زبانهای خارجی 1391

the ability of composing a coherent and extended piece of writing in second language is considered as a fundamental factor to convey information and ideas of learners through the academic issues. although learners may achieve a perfect academic writing skill through assigning the l2 tasks in content based instruction, but demonstration of their abilities may be related to their ability in l1 es...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه فردوسی مشهد - دانشکده علوم 1375

chapter two presents three m-admissible function algebras ab, bd, and sl, to construct the universal abelian, band, and semilattice compactifications, respectively. the main results are (11.3), (12.3), and (12.4). some inclusion relationships between these function algebras and the other well-known ones, presented in section 8, are made via the devico of compactifications. chpter three is about...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید