نتایج جستجو برای: security environment
تعداد نتایج: 678646 فیلتر نتایج به سال:
The purpose of this study is theoretical and methodological substantiation, deepening of conceptual provisions and development of scientific and practical recommendations for the formation of an integrated sector of national security and defense based on the principles of national resilience. The relevance of this study is due to the need to build national resilience to address the main problem...
Previous research has shown that the nature of job stress symptoms are different between men and women. present research, is main concern with the different nature of job stress symptoms the namely anxiety, psychosomatic complaints and the main variables influencing job stress including job security, job characteristics and social relations in work environment between men and women. Results sh...
Security is a very important issue in the development and dynamics of urban spaces. One of the areas in which security is considered very important in its development is the economic sector, and bazar security is essential as a clear manifestation of economic activities. The Iranian Bazar is one of the important urban spaces and its economic beating heart, and it consists of different spaces, o...
DEFINITION This entry considers how to build secure database system software. In particular, it describes how to build a general-purpose database management system where security is an important design parameter. For the database community the words secure database design may refer to the schema design to produce a database for a specific application with some level of security properties. Ther...
One of the most important capabilities of information security management systems, which must be implemented in all organizations according to their requirements, is information security risk management. The application of information security risk management is so important that it can be named as the heart of information security management systems. Information security risk rating is conside...
in order to elucidate the significance and the position of international cultural relations in transformation of global peace and security, we should initially study its indicators through the cultural relationships among the nations, public, private and international organizations, social movements, international displacement /migration and modern communication technologies and then we should ...
Purpose: This paper aims to evaluate the security of web-based information systems of Iran Public Libraries Foundation (IPLF). Methodology: Survey method was used as a method for implementation. The tool for data collection was a questionnaire, based on the standard ISO/IEC 27002, that has the eleven indicators and 79 sub-criteria, which examines security of web-based information systems of IP...
Today, we are witnessing the expansion of various Internet of Things (IoT) applications and services such as surveillance and health. These services are delivered to users via smart devices anywhere and anytime. Forecasts show that the IoT, which is controlled online in the user environment, will reach 25 billion devices worldwide by 2020. Data security is one of the main concerns in the IoT. ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید