نتایج جستجو برای: security threats
تعداد نتایج: 201039 فیلتر نتایج به سال:
Abstract In the wake of the 1979 Islamic Revolution in Iran and the ensuing dominance of political Islam discourse and its impact on Pakistani society, the ground was prepared for the spread of Wahhabism and anti-Shiism in that country due to the failure of the Islamabad government to manage the reactive conduct of extremist Salafist groups as well as its engagement in internal dis...
Socio-Technical Systems (STSs) combine the operations of technical systems with choices and intervention humans, namely users systems. Designing such is far from trivial due to interaction heterogeneous components, including hardware components software applications, physical elements as tickets, user interfaces, touchscreens displays, notably, humans. While possible security issues about are w...
How to cite this article:Bari ABA. Healthcare Facilities and Cyber Security Threats. Chettinad Health City Med J. 2022;11(4):1.
In the ever developing world of technology, mobile applications are increasing day by alongside with cyber threats. This fact is valid as a result shifts from e-government to m-government and classical e-business m-business solutions. Therefore electronic structure government services can be accessed apps using signatures. The main threat personal data that captured malicious codes hence danger...
The development of cloud computing and distributed technologies has shifted log management operations to an aggregated form. Diverse information devices as well systems perform data collection status analysis through a unified aggregation system. However, with the increasingly diverse business forms, threats confronted by are also mounting, among which leakage, tampering, loss, security vulnera...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید