نتایج جستجو برای: security arrangements

تعداد نتایج: 198305  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تربیت مدرس 1389

abstract: country’s fiber optic network, as one of the most important communication infrastructures, is of high importance; therefore, ensuring security of the network and its data is essential. no remarkable research has been done on assessing security of the country’s fiber optic network. besides, according to an official statistics released by ertebatat zirsakht company, unwanted disconnec...

2007

Digital Rights Management (DRM) is an umbrella term for any of several arrangements which allows a vendor of content in electronic form to control the material and restrict its usage in various ways that can be speci ed by the vendor. These arrangements are provided through security techniques, mainly encryption, and the distribution, in a detached manner, of content and rights. This allows fre...

2007

Digital Rights Management (DRM) is an umbrella term for any of several arrangements which allows a vendor of content in electronic form to control the material and restrict its usage in various ways that can be speci ed by the vendor. These arrangements are provided through security techniques, mainly encryption, and the distribution, in a detached manner, of content and rights. This allows fre...

2012
Janine A. Holgate Susan P. Williams Catherine A. Hardy

The aim of this paper is to report on how information security governance (ISG) arrangements are framed and shaped in practice. Our objective is to examine the extent to which the similarities and differences in institutional environments can subject organizations to multiple, competing and even contradictory arrangements for ISG. Using an interpretive case based research strategy we investigat...

2003
Assar Lindbeck

The achievements of social-welfare arrangements in Western Europe are well known: considerable income security, relatively little poverty and, in some countries, ample supply of social services. But there are also well-known weaknesses and hence considerable scope for improvement. Three types of weaknesses are considered in this paper: social-welfare arrangements are often not financially robus...

, ,

The purpose of this paper is to examine the Persian Gulf system of cybernetics and the possibility of Iran's role and influence on the future of security arrangements in the Persian Gulf region. In this regard, the author describes the cybernetic theory in regional studies as a conceptual framework of the research to implement the hegemonic security system of the Persian Gulf. Then, by showing ...

The occurrence of Islamic awakening in 2011, the most important part of the Muslim world and the continuing protests in Saudi Arabia, Jordan, Bahrain and likely to spread to other Arab countries in the past caused the disorder, and the powers of regional, inter-regional and trans is regional. How America in creating new security arrangements in the Middle East in the light of revolutionary deve...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید