نتایج جستجو برای: compromising international security

تعداد نتایج: 487404  

2015
Margaret Bourdeaux Vanessa Kerry Christian Haggenmiller Karlheinz Nickel

BACKGROUND Destruction of health systems in fragile and conflict-affected states increases civilian mortality. Despite the size, scope, scale and political influence of international security forces intervening in fragile states, little attention has been paid to array of ways they may impact health systems beyond their effects on short-term humanitarian health aid delivery. METHODS Using cas...

2015
J.W.M. van der Linden M.C. Arendrup A. Warris K. Lagrou H. Pelloux P.M. Hauser E. Chryssanthou E. Mellado S.E. Kidd A.M. Tortorano E. Dannaoui P. Gaustad J.W. Baddley A. Uekötter C. Lass-Flörl N. Klimko C.B. Moore D.W. Denning A.C. Pasqualotto C. Kibbler S. Arikan-Akdagli D. Andes J. Meletiadis L. Naumiuk M. Nucci W.J.G. Melchers P.E. Verweij

To investigate azole resistance in clinical Aspergillus isolates, we conducted prospective multicenter international surveillance. A total of 3,788 Aspergillus isolates were screened in 22 centers from 19 countries. Azole-resistant A. fumigatus was more frequently found (3.2% prevalence) than previously acknowledged, causing resistant invasive and noninvasive aspergillosis and severely compromi...

Journal: :مجله مطالعات حقوق تطبیقی 0
اسداله بابایی فرد استادیار گروه علوم اجتماعی دانشکدۀ علوم انسانی دانشگاه کاشان

at current study, the relationship between transnational law, globalization and international solidarity has been studied, and talcott parsons's structural functionalism approach has been used as theoretical framework. this study is based on the assumption that: any inconsistency between the legal system and other social systems can result in social anomie. in the next part of the paper, t...

2017

With the rise of security breaches and the running of technology at its highest gear on the information superhighway, protection of confidential and vital information never has been more crucial. This paper provides an overview of an international effort called Common Criteria (CC), an IT Security evaluation methodology, developed to define and facilitate consistent evaluations of security prod...

The terms of Power, influence and authority could be heard in political world vastly, but using these terms is not leaving only to this realm. Despite its visual simplicity, generally there is not similar and equal perception about term of Power among people. Understanding about by politicians differs from lawyer perception about this term.  What people takes about Power, totally differ from wh...

2017

With the rise of security breaches and the running of technology at its highest gear on the information superhighway, protection of confidential and vital information never has been more crucial. This paper provides an overview of an international effort called Common Criteria (CC), an IT Security evaluation methodology, developed to define and facilitate consistent evaluations of security prod...

2001

Preparing the books to read every day is enjoyable for many people. However, there are still many people who also don't like reading. This is a problem. But, when you can support others to start reading, it will be better. One of the books that can be recommended for new readers is data and applications security developments and directions ifip tc11 wg11 3 fourteenth annual working conference o...

2004
Christopher Church

ISBN 555555555/$10.00  2004 IEEE Abstract – Malicious worms have presented a formidable threat to the security community in recent years. Beginners to internet security research require an understanding of the inner workings of worms. A simple research worm designed to run on a test network facilitates this understanding. This worm is also useful to researchers needing see how a typical worm w...

2004
JAMES E. DOYLE

Dr. James E. Doyle is a technical staff member in the Nonproliferation and International Security Division at Los Alamos National Laboratory. His professional focus is on systems analysis, strategic planning, and policy development. Dr. Doyle holds a Ph.D in International Security Studies from the University of Virginia. Previously, Dr. Doyle was a senior policy analyst at Science Applications ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید