نتایج جستجو برای: infrastructural
تعداد نتایج: 2856 فیلتر نتایج به سال:
d: M.A. of Business Management. University of Isfahan . [email protected] e: Isfahan University of Medical Sciences , [email protected] Knowledge as one of the greatest factors in creating value and competitive advantage, has led organizations to show great tendency toward programs of knowledge management. Understanding the relationship between infrastructural capabilities and process c...
Abstract—The threat modeling process starts with the phases of identifying critical assets, creating an architecture overview, and decomposing to identify possible points of attack. Data flow diagrams and sequence diagrams are used in this process. This paper proposes an alternative flow-based methodology for building an architectural map for the system. It provides a high-level methodology for...
This article examines the role of espionage in defending against cyber-attacks on infrastructural firms. We analyze the problem using a game between a government, an infrastructural firm and an attacker. If the attacker successfully breaches the IT security defenses of the infrastructural firm, primary losses accrue to that firm while widespread collateral losses accrue to the rest of the econo...
d: m.a. of business management. university of isfahan . [email protected] e: isfahan university of medical sciences , [email protected] knowledge as one of the greatest factors in creating value and competitive advantage, has led organizations to show great tendency toward programs of knowledge management. understanding the relationship between infrastructural capabilities and process c...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید