نتایج جستجو برای: software security

تعداد نتایج: 593525  

Journal: :Системи управління, навігації та зв’язку. Збірник наукових праць 2019

Journal: :Software: Practice and Experience 2003

Journal: :Efektyvna ekonomika 2019

2005
Hugh Hefner

mation security models or the fundamental building blocks used to create them. (A good example of this is “When Hashes Collide,” the first installment of the magazine’s newest department, Crypto Corner. Yet, we rarely read about security technology’s strengths and weaknesses in the specific hardware and software products used in real-world environments. Isn’t it curious that almost no published...

پایان نامه :دانشگاه آزاد اسلامی - دانشگاه آزاد اسلامی واحد تهران مرکزی - دانشکده ادبیات و علوم انسانی 1391

peace and national security protection and ironic solving of international conflicts become the preliminary foundation of the united nations charter and had been considered as the main responsibilities of the security council, after world war ii and the establishment of united nations organization. therefore, the security council enables to analyze every kind of conflicts and challenges which ...

Journal: :International Journal on Advanced Science, Engineering and Information Technology 2011

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه صنعتی اصفهان - دانشکده ریاضی 1390

this page was created using nitro pdf trial software. to purchase, go to http://www.nitropdf.com/ this page was created using nitro pdf trial software. to purchase, go to http://www.nitropdf.com/ this page was created using nitro pdf trial software. to purchase, go to http://www.nitropdf.com/ this page was created using nitro pdf trial software. to purchase, go to http://www.nitropdf.com...

Designing a secure software is one of the major phases in developing a robust software. The McGraw life cycle, as one of the well-known software security development approaches, implements different touch points as a collection of software security practices. Each touch point includes explicit instructions for applying security in terms of design, coding, measurement, and maintenance of softwar...

Journal: :isecure, the isc international journal of information security 0
a. sedaghatbaf school of computer engineering, iran university of science and technology, tehran, iran m. abdollahi azgomi school of computer engineering, iran university of science and technology, tehran, iran

quantitative and model-based prediction of security in the architecture design stage facilitates early detection of design faults hence reducing modification costs in subsequent stages of software life cycle. however, an important question arises with respect to the accuracy of input parameters. in practice, security parameters can rarely be estimated accurately due to the lack of sufficient kn...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تربیت مدرس 1389

abstract: country’s fiber optic network, as one of the most important communication infrastructures, is of high importance; therefore, ensuring security of the network and its data is essential. no remarkable research has been done on assessing security of the country’s fiber optic network. besides, according to an official statistics released by ertebatat zirsakht company, unwanted disconnec...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید