نتایج جستجو برای: protecting it against threats such as materialism
تعداد نتایج: 7161161 فیلتر نتایج به سال:
There exists a gap between existing security mechanisms and their ability to detect advancing threats. Antivirus EDR (End Point Detection Response) aim prevent threats; such are reactive. This approach did not prove be effective in protecting against stealthy attacks. SCADA (Supervisory Control Data Acquisition) is crucial for any country. However, always an easy target adversaries due lack of ...
the inhuman acts of israel in the gaza strip (2008-9) have seriously violated the international humanitarian law.international documents such as the geneva convention (iv) and additional protocol to the geneva conventions (ii) relating to protecting civilians during armed conflicts have clearly indicated violation of humanitarian law during israeli’s deadly offensive at the turn of the year. u...
The safety and security of a nuclear facility share a common objective – ensure the protection of the local population, society at large, and the environment. The gradual transition in reactor safety regulation from highly deterministic requirements toward a more riskinformed framework provides a useful analogue for reactor security and ensuring effective resource allocation. However, there are...
vocabulary as a major component of language learning has been the object of numerous studies each of which has its own contribution to the field. finding the best way of learning the words deeply and extensively is the common objective of most of those studies. however, one effective way for achieving this goal is somehow neglected in the field. using a variety of activities such as games can r...
While it is easy to identify formal security education efforts directed towards professional programmes and academic curricula, it is arguable that the far larger population of end-users rarely benefit from such focused consideration. The paper discusses the nature of the challenge and presents survey evidence to illustrate that users are not coping with the technologies that they are expected ...
this study investigates the strategies native english and persian speakers employ for expressing gratitude in different situations. the strategies of persian efl learners are also compared with english strategies in order to find the differences that may exist between these two languages. social status and size of imposition of the favor are social variables which are investigated in detail for...
Businesses operating in the Global Financial Services Industry (GFSI) know the importance of protecting information assets from ever-growing security threats and risks. This paper aims at shedding light on the relationships between four relevant contextual factors i.e. national legal infrastructure, transparency levels, ethical behavior of firms, and capacity for innovation, on the one hand, an...
association of southeast asia nations (asean) was created in 1967 in order to prevent the threat of communism in southeast asia. but, over time, new states joined it and goals and activities of this organization expanded to other areas such as economic, commercial, political and cultural ones. thus, over time, cooperation between members expanded in a way today this regional organization is con...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید