نتایج جستجو برای: security management

تعداد نتایج: 1006782  

Journal: :Oditor 2022

Risk management in payment transactions includes identifying, measuring and managing risks. That is why it necessary to establish its effective function transactions. In the last ten years, development of risk countries transition evident. Bearing these facts mind, aim this research study analyze risks transactions, with special reference analysis cash management. The results overview show that...

Journal: :international journal of environmental research 2014
c. shao y. guan c. chu r. shi m. ju

the “driving force - pressure - state - impact – response” modeling framework isadopted to consider the formation mechanisms of environmental risks and the requirements ofecological environment protection. moreover, a systematical index system and evaluation model forthe measurement of the coastal ecological security level is put forward in this paper to assess thestate of coastal ecological en...

2003
Eirik Albrechtsen

1 Background This brief paper is written for use in the course ‘Security – analyse og ledelse’. The main purpose of the paper is to introduce the term security and to discuss differences between security and safety. The reason for this discussion is security management’s lack of academic foothold. Nevertheless, safety management has a long tradition of scientific research. Thus, as will be show...

2016
Carol Hsu

Given the multifaceted problems and complexities of information security, the manner in which top management teams make investment and management decisions regarding security technologies, policy initiatives, and employee education could have a significant impact on the likelihood of information security breaches in organizations. In the context of information security management, it is not cle...

Journal: :InformingSciJ 2002
Adi Armoni

This research deals with data security management in distributed and client/server computer systems, placing special emphasis on access security. The paper presents the subject of data security management in these systems by describing them, examining their vulnerable points and presenting adequate solutions. The paper includes a survey on the subject of authorization, authentication, encryptio...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه علامه طباطبایی 1388

this dissertation has six chapter and tree appendices. chapter 1 introduces the thesis proposal including description of problem, key questions, hypothesis, backgrounds and review of literature, research objectives, methodology and theoretical concepts (key terms) taken the literature and facilitate an understanding of national security, national interest and turkish- israeli relations concepts...

2004
Gustavo A. Santana

In this paper, we describe SAMARATM, a Security Agent-Based environment for security process design, management, and execution that integrates aspects of security process modeling, security assessment, and security management. SAMARA is targeted specifically to domains such as engineering security design in which the dynamic and uncertain nature of the security processes present management chal...

2005
Min Song

Introduction 1 Mobile Device Families 1 Mobile Handsets 1 Mobile PCs 3 Mobile Protocols 4 Peer-to-Peer Protocols 4 Client/Server Protocols 6 Mobile Devices Security and Measures 8 Security Attacks on Mobile Devices 8 User-Mobile Level Security Measures 8 Mobile Data and Applications Level Security Measures 9 Network Communications Level Security Measures 9 Mobile Device Mobility Management 10 H...

Journal: :Национальная безопасность / nota bene 2020

Journal: :Фундаментальные исследования (Fundamental research) 2020

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید