نتایج جستجو برای: static security assessment
تعداد نتایج: 833814 فیلتر نتایج به سال:
this research is about the political economy of china in central asia. in this research the political & economic interactions affected on chinas political economy in central asia are examined. chinas goal of presence in central asia including political-security, economic and energy goals is described in one part. in another part, the trade relations between china and central asian countries ar...
The key threat to information security is constituted by careless employees who do not comply with information security policies. To ensure that employees comply with organizations’ information security procedures, a number of information security policy compliance measures have been proposed in the past. Prior research has criticized these measures as lacking theoretically and empirically grou...
Porto, the institutional repository of the Politecnico di Torino, is provided by the University Library and the IT-Services. The aim is to enable open access to all the world. Please share with us how this access benefits you. Your story
abstract This article briefly reviews two important goals in online education: interaction and presence. These are important goals in online education because they are linked to learning and motivation to learn. The article provides guidelines and an extended example of how to design an online course in information security in a manner that will enhance interaction and presence. This article's ...
We describe a method for finding security flaws in source code by way of static analysis. The method is notable because it allows a user to specify a wide range of security properties while also leveraging a set of predefined common flaws. It works by using an automated theorem prover to analyze verification conditions generated from C source code and a set of specifications that define securit...
The authors advocate a modernization of the neurologic exam with regard to the evaluation of static equilibrium through the application of some easily performed and interpreted bedside maneuvers like the Clinical Test of Sensory Integration and Balance modified and the Functional Reach Test. The authors also believe that these and other assessments, such as that of the risk of falling for elder...
Purpose – In methods and manuals, the product of an information security incident’s probability and severity is seen as a risk to manage. The purpose of the test described in this paper is to investigate if information security risk is perceived in this way, if decision-making style influences the perceived relationship between the three variables and if the level of information security expert...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید