نتایج جستجو برای: static security assessment

تعداد نتایج: 833814  

Journal: :IOSR Journal of Electrical and Electronics Engineering 2013

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه علامه طباطبایی 1391

this research is about the political economy of china in central asia. in this research the political & economic interactions affected on chinas political economy in central asia are examined. chinas goal of presence in central asia including political-security, economic and energy goals is described in one part. in another part, the trade relations between china and central asian countries ar...

2007
Mikko T. Siponen Seppo Pahnila Mo Adam Mahmood

The key threat to information security is constituted by careless employees who do not comply with information security policies. To ensure that employees comply with organizations’ information security procedures, a number of information security policy compliance measures have been proposed in the past. Prior research has criticized these measures as lacking theoretically and empirically grou...

Journal: :Rel. Eng. & Sys. Safety 2011
Galileo Tamasi Micaela Demichela

Porto, the institutional repository of the Politecnico di Torino, is provided by the University Library and the IT-Services. The aim is to enable open access to all the world. Please share with us how this access benefits you. Your story

Journal: :IJICTE 2007
Cindy S. York Dazhi Yang Melissa Dark

abstract This article briefly reviews two important goals in online education: interaction and presence. These are important goals in online education because they are linked to learning and motivation to learn. The article provides guidelines and an extended example of how to design an online course in information security in a manner that will enhance interaction and presence. This article's ...

2002
Brian Chess

We describe a method for finding security flaws in source code by way of static analysis. The method is notable because it allows a user to specify a wide range of security properties while also leveraging a set of predefined common flaws. It works by using an automated theorem prover to analyze verification conditions generated from C source code and a set of specifications that define securit...

Journal: :Information Security Journal: A Global Perspective 2009

2011
Péricles A. Maranhão-Filho Eliana Teixeira Maranhão Marcos Martins da Silva Marco Antônio Lima

The authors advocate a modernization of the neurologic exam with regard to the evaluation of static equilibrium through the application of some easily performed and interpreted bedside maneuvers like the Clinical Test of Sensory Integration and Balance modified and the Functional Reach Test. The authors also believe that these and other assessments, such as that of the risk of falling for elder...

Journal: :Inf. & Comput. Security 2016
Teodor Sommestad Henrik Karlzén Peter Nilsson Jonas Hallberg

Purpose – In methods and manuals, the product of an information security incident’s probability and severity is seen as a risk to manage. The purpose of the test described in this paper is to investigate if information security risk is perceived in this way, if decision-making style influences the perceived relationship between the three variables and if the level of information security expert...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید