نتایج جستجو برای: critical security studies

تعداد نتایج: 1986502  

Journal: :Harvard Law Review 1956

2016
Peter Leo Gorski Luigi Lo Iacono

Application Programming Interfaces (APIs) are a vital link between software components as well as between software and developers. Security APIs deliver crucial functionalities for programmers who see themselves in the increasing need for integrating security services into their software products. The ignorant or incorrect use of Security APIs leads to critical security flaws, as has been revea...

2015
A Michaela Vašková

The paper is focused on the application of the security audit method on the selected objects of the critical infrastructure. The emphasis is put on security audit method to find gaps in the critical infrastructure security. The theoretical part describes objects of the critical infrastructure. The practical part describes using of the security audit method. The main emphasis was put on the prot...

Journal: :British Journal of Educational Studies 2015

Journal: :Comillas journal of international relations 2022

Security is an essential social and political institution for International Relations the cornerstone of Studies. In this sense, role religion increasingly relevant, recognised as a key factor in global politics. With regard to Islam, its examination has been marked by phenomena terrorism or other revolutionary processes their direct impact on security. However, careful observation fundamental ...

Uncovering DNA sequence variations that correlate with phenotypic changes, e.g., diseases, is the aim of sequence variation studies. Common types sequence variations are Single nucleotide polymorphism (SNP, pronounced snip).SNPs are the third-generation molecular marker. SNP represents a DNA sequence variant of a single base pair with the minor allele occurring in more than 1% of a given popula...

Due to the fast development in information and communication technology, new challenging problems appear in the security. So, it is important and vital that the scientific society of our country focuses on research and studies these problems and by providing new proposal try to respond to these critical needs of our country. Hence, our aim in this paper is to study and highlight one of the impo...

2013
Alper Ozbilen Ilhami Colak Seref Sagiroglu

Supervisory Control and Data Acquisition (SCADA) systems and other distributed control systems, are widely used in critical infrastructure and industrial plants. In recent times, many distinguished newspapers, magazines and reports publicized successful intrusions and attacks on SCADA based systems to bring security issues of critical infrastructure to the agenda. Recent various studies and ass...

Journal: :مجله دانشکده ادبیات و علوم انسانی(منتشر نمی شود) 0
دکتر سید محمد طباطبائی بهبهانی( منصور)

sahl ibn-abdullah tostari is one of the most outstanding and massine figures in the islamic mysticism. he has had much influence and impact on this sort of mysticism. one may notice his profound influence in any mystical sources and references. some orientalists have done studies conceming him and his immense influence as well. in this research, it has been tried to survey this impact through i...

Journal: :CoRR 2016
Marcel von Maltitz Cornelius Diekmann Georg Carle

Privacy analysis is critical but also a time-consuming and tedious task. We present a formalization which facilitates designing and auditing privacy properties of IT systems. It is based on static taint analysis and makes ow and processing of privacy-critical data explicit, globally as well as on the level of individual data subjects. Formally, we show equivalence to traditional label-based inf...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید