نتایج جستجو برای: security management
تعداد نتایج: 1006782 فیلتر نتایج به سال:
Risk management in payment transactions includes identifying, measuring and managing risks. That is why it necessary to establish its effective function transactions. In the last ten years, development of risk countries transition evident. Bearing these facts mind, aim this research study analyze risks transactions, with special reference analysis cash management. The results overview show that...
the “driving force - pressure - state - impact – response” modeling framework isadopted to consider the formation mechanisms of environmental risks and the requirements ofecological environment protection. moreover, a systematical index system and evaluation model forthe measurement of the coastal ecological security level is put forward in this paper to assess thestate of coastal ecological en...
1 Background This brief paper is written for use in the course ‘Security – analyse og ledelse’. The main purpose of the paper is to introduce the term security and to discuss differences between security and safety. The reason for this discussion is security management’s lack of academic foothold. Nevertheless, safety management has a long tradition of scientific research. Thus, as will be show...
Given the multifaceted problems and complexities of information security, the manner in which top management teams make investment and management decisions regarding security technologies, policy initiatives, and employee education could have a significant impact on the likelihood of information security breaches in organizations. In the context of information security management, it is not cle...
This research deals with data security management in distributed and client/server computer systems, placing special emphasis on access security. The paper presents the subject of data security management in these systems by describing them, examining their vulnerable points and presenting adequate solutions. The paper includes a survey on the subject of authorization, authentication, encryptio...
this dissertation has six chapter and tree appendices. chapter 1 introduces the thesis proposal including description of problem, key questions, hypothesis, backgrounds and review of literature, research objectives, methodology and theoretical concepts (key terms) taken the literature and facilitate an understanding of national security, national interest and turkish- israeli relations concepts...
In this paper, we describe SAMARATM, a Security Agent-Based environment for security process design, management, and execution that integrates aspects of security process modeling, security assessment, and security management. SAMARA is targeted specifically to domains such as engineering security design in which the dynamic and uncertain nature of the security processes present management chal...
Introduction 1 Mobile Device Families 1 Mobile Handsets 1 Mobile PCs 3 Mobile Protocols 4 Peer-to-Peer Protocols 4 Client/Server Protocols 6 Mobile Devices Security and Measures 8 Security Attacks on Mobile Devices 8 User-Mobile Level Security Measures 8 Mobile Data and Applications Level Security Measures 9 Network Communications Level Security Measures 9 Mobile Device Mobility Management 10 H...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید