نتایج جستجو برای: without access to public information
تعداد نتایج: 10965083 فیلتر نتایج به سال:
Purpose: As the world rapidly moves into the new era of information and wisdom, the needs of human beings to use books and libraries continue to grow. With this in mind, in addition to increasing public library services, it's important for planners to distribute library facilities equitably across the country. In this paper we will study the distribution of public libraries in the Provinces of ...
The term data security refers to the degree of resistance of protection given to information from unintended or unauthorized access. The core principles of information security remain the same Confidentiality, Integrity and Availability also referred as CIA triad. With cloud adoption the confidential enterprise data is moved from organization premises to untrusted public network and due to this...
the ability of composing a coherent and extended piece of writing in second language is considered as a fundamental factor to convey information and ideas of learners through the academic issues. although learners may achieve a perfect academic writing skill through assigning the l2 tasks in content based instruction, but demonstration of their abilities may be related to their ability in l1 es...
chapter two presents three m-admissible function algebras ab, bd, and sl, to construct the universal abelian, band, and semilattice compactifications, respectively. the main results are (11.3), (12.3), and (12.4). some inclusion relationships between these function algebras and the other well-known ones, presented in section 8, are made via the devico of compactifications. chpter three is about...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید