نتایج جستجو برای: battery and threat for security
تعداد نتایج: 19063936 فیلتر نتایج به سال:
FTP is a widely used protocol for working with remote file systems. Various FTP implementations have had security problems reported as late as 2010. There lacks a systematic analysis of FTP security. In this paper, threat models are built to provide a systematic coverage of potential security attacks against an FTP server. Security tests are then generated from the threat models and applied to ...
this study gives a rough notional method to find their textual placing and valuating in the text, narrows the board of vision to mystic items and finally lists the strategies used by the translators of mathnawi to present solutions for preserving the additional values. at last, as the sum-up, strategies in comparison would be presented. it should be noted that by extending the translations from...
association of southeast asia nations (asean) was created in 1967 in order to prevent the threat of communism in southeast asia. but, over time, new states joined it and goals and activities of this organization expanded to other areas such as economic, commercial, political and cultural ones. thus, over time, cooperation between members expanded in a way today this regional organization is con...
this study aimed to investigate the effects of listening strategy training on iranian efl learners listening comprehension and use of such strategies. this work, employing an experimental methodology, was conducted among 60 adult efl learners from a language institute in isfahan, iran, as participants. the participants, who were selected based on the results of a placement test, were assigned t...
the purpose of this study was to investigate iranian efl learners’ beliefs about the role of rote learning (rl) in vocabulary learning strategies; besides, the study examined if english proficiency would influence learners’ vocabulary learning strategy use. this study addresses the need for a clear understanding of the role of rl in efl vocabulary learning by looking at iranian efl learners’ ow...
this study investigates the relationship between field-related cognitive styles and global reading comprehension of hypertext. technically, field dependency is prevailing dominance of field on perception of parts, while global comprehension is skim-like reading to grasp the general content. in this research project, 60 senior and junior students of arak university majoring in english literature...
the aim of this study is investigating the effect of teaching “metacognitive strategies” on the way which scientific information retrieval workes by the using of google scholar searching machine on the students of ms in the psycology & education faculty of allameh tabatabayi university in 2007-2008 academic year. the statistical community was the students of ms in psychology & education facult...
let h be a separable hilbert space and let b be the set of bessel sequences in h. by using several interesting results in operator theory we study some topological properties of frames and riesz bases by constructing a banach space structure on b. the convergence of a sequence of elements in b is de_ned and we determine whether important properties of the sequence is preserved under the con...
Network threat confronting organizations comes from not only outsider threat, but also insider threat. Nowadays, insider threat is widely recognized as an important issue of security management. However, tools and controls on how to fight against it are still in the research phase. Security architecture for defending insider threat is presented, which is composed of four parts: monitoring platf...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید