نتایج جستجو برای: especially security needs

تعداد نتایج: 778134  

2003

As information systems become increasingly important to the functions of organizations, security and reliable operation of these systems are also becoming increasingly important. Interoperability, information sharing, collaboration, design imperfections, limitations, and the like lead to vulnerabilities that can endanger information system security and operation. Unfortunately, understanding an...

2014
Sergey Bratus Iván Arce Michael E. Locasto Stefano Zanero

Offensive security—or, in plain English, the practice of exploitation—has greatly enhanced our understanding of what it means for computers to be trustworthy. Having grown from hacker conventions that fit into a single room into a distinct engineering discipline in all but the name, offensive computing has so far been content with a jargon and an informal “hacker curriculum”. Now that it is unm...

2013
Aditi Srivastava Sonal Sinha

E-Learning refers to “electronic learning”. E-Learning is the use of any type of technology which improves learning and makes it much easier. Development of E-learning tools is an active area of education today. In today’s fast-paced culture, E-learning is the need of the hour. It is being used as a big platform for enhancing and upgrading knowledge. It increases flexibility in various fields a...

2016
Zhanjiang Wang Shuoning Wang Ling Wang

Now the network has become the main source of the information where people gain from. However there are various network information, include healthy and helpful information, at the same time; also include the bad and useless information. How to protect the security and quickly and exactly find the user need from this vast information has become the hot research. This article use the improve vec...

Journal: :Informatica, Lith. Acad. Sci. 2000
Algirdas Pakstas Igor Shagaev

Growing popularity of the mobile code requires to consider various aspects related to its security. In the aviation industry there is a case when additional information needs to be delivered to the pilot by uploading it from the ground station. It creates a need for a platform-independent solution and it raises a problem of the mobile code security as well. Organization of the security in the B...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه علامه طباطبایی 1390

abstract because of the many geopolitical, geo economical and geo strategically potentials and communicational capabilities of eco region, members can expand the convergence and the integration in base of this organization that have important impact on members development and expanding peace in international and regional level. based on quality analyzing of library findings and experts interv...

2006
M V Ramana

After decades of poor performance, atomic energy seems to have received a second wind, especially after the joint statement of 18 July 2005 by the Indian prime minister Manmohan Singh and the US president George W Bush. Many pro-nuclear advocates now aver that a large-scale expansion of nuclear power is the only way to meet our electricity needs and ensure energy security. An examination of the...

Journal: مدیریت شهری 2015
,

Security as one of the basic human needs has a special place in relaxation, comfort and spiritual needs provision. For this reason, security is always of managers, planners, architects and urban designers' interest. Solutions and strategies of security provision have been fundamentally changed following prevailing change of housing architecture patterns from homes to residential complexes and h...

2012
Patrick J. Carroll Robert M. Arkin Steven D. Seidel John Morris

Typically, people rate enhancement needs as more important than security needs to their well-being. Two studies tested whether event valence and prior trauma moderate relative need importance. Traumatized (hurricane survivors) and non-traumatized (control) participants recalled the most ‘‘distressing’’ (security-relevant) or ‘‘satisfying’’ (enhancement-relevant) event they had recently experien...

2009
H. Cruickshank R. Mort M. Berioli

Satellites had been successful in the past due to their wide area coverage and speedy deployment of new services especially in remote regions of Europe and the rest of the world. The future development of broadband satellite systems providing services based on the Internet Protocol (IP) needs to be stimulated by means of common standards. This paper presents the ETSI BSM PEP architecture which ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید