Challenges and Security Vulnerabilities to Impact on Database Systems

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

the geopolitics of afghanistan after september 11, 2001, and its impact on iranian national security

abstract u.s. attack to afghanistan after 9/11 provided opportunities for us who tried to become the dominant power after collapse of ussr and bipolar world. thinkers like fukuyama believed american liberal democrats thought would be universally accepted without resistances. liberal democracy is the best and final model of governance; in this regard, united state has moral responsibilities for...

15 صفحه اول

Climate challenges, vulnerabilities, and food security.

This paper identifies rare climate challenges in the long-term history of seven areas, three in the subpolar North Atlantic Islands and four in the arid-to-semiarid deserts of the US Southwest. For each case, the vulnerability to food shortage before the climate challenge is quantified based on eight variables encompassing both environmental and social domains. These data are used to evaluate t...

متن کامل

wind farm impact on generation adequacy in power systems

در سال های اخیر به دلیل افزایش دمای متوسط کره زمین، بشر به دنبال روش های جایگزین برای تامین توان الکتریکی مورد نیاز خود بوده و همچنین در اکثر نقاط جهان سوزاندن سوخت های فسیلی در نیروگاه های حرارتی به عنوان مهم ترین روش تولید توان الکتریکی مطرح بوده است. به دلیل توجه به مسایل زیست محیطی، استفاده از منابع انرژی تجدید پذیر در سال های اخیر شدت یافته است. نیروگاه های بادی به عنوان یک منبع تولید توان...

15 صفحه اول

A survey on impact of cloud computing security challenges on NFV infrastructure and risks mitigation solutions

Increased broadband data rate for end users and the cost of resource provisioning to an agreed SLA in telecom service providers, are forcing operators in order to adhere to employment Virtual Network Functions (VNF) in an NFV solution. The newly 5G mobile telecom technology is also based on NFV and Software Define Network (SDN) which inherit opportunities and threats of such constructs. Thus a ...

متن کامل

turkish-israeli relations and their implication on iranian national security

this dissertation has six chapter and tree appendices. chapter 1 introduces the thesis proposal including description of problem, key questions, hypothesis, backgrounds and review of literature, research objectives, methodology and theoretical concepts (key terms) taken the literature and facilitate an understanding of national security, national interest and turkish- israeli relations concepts...

15 صفحه اول

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Al-Mustansiriyah Journal of Science

سال: 2018

ISSN: 2521-3520,1814-635X

DOI: 10.23851/mjs.v29i2.332