نتایج جستجو برای: security in procedures
تعداد نتایج: 17020606 فیلتر نتایج به سال:
one of the crimes mentioned in the islamic jurisprudence and iranian statute laws as a crime against public security and security of the roads as well as terrifying the public is the crime of in fringement of public security and corruption on the earth. the present paper is an attempt to offer a comprehensive definition of “waging a war and corruption on the earth” from the jurisprudential and ...
The security audit in operating system is necessary, especially when there are multiple users using it or when the system is part of a company’s network. Before heading into the security audit, you have to be aware of the fundamentals of IT security auditing, whose main objective is to assure protection of the information assets and to dispense information properly to authorized parties. In ord...
security building processes after world war ii, were under the influence of realistic thoughts. this was considered a reaction to idealistic and institutional approaches. critical school attempted to criticize classical and structural realism. new security theoreticians emphasize on extended subjects and diverse threats and believe it to be beyond the competition of countries. they believe that...
Organizational security initiatives by corporations have been voted number one for IT project priorities for the year 2006. The increasing concern for the security of information systems is further intensified with the plethora of governmental regulations emphasizing security, both of information systems and of soft data. The Health Insurance Portability and Accountability Act (HIPPA), the Sarb...
In wireless era, digital users in electronic world (e-world) are represented by a set of data called Digital Identity (ID), which they use, among other functions, for authentication purposes. Within the e-world it is risky to lose the identity and so security solutions are required to protect IDs. Information security should provide the necessary identity management (IDM) process to mitigate th...
As computation spreads from computers to networks of computers, and migrates into cyberspace, it ceases to be globally programmable, but it remains programmable indirectly and partially: network computations cannot be controlled, but they can be steered by imposing local constraints on network nodes. The tasks of ”programming” global behaviors through local constraints belong to the area of sec...
This document provides a security framework for the MPLS Transport Profile (MPLS-TP). MPLS-TP extends MPLS technologies and introduces new Operations, Administration, and Maintenance (OAM) capabilities, a transport-oriented path protection mechanism, and strong emphasis on static provisioning supported by network management systems. This document addresses the security aspects relevant in the c...
the social security act is called as a new branch of law. one of the important sections on social security criminal act is the section 97 which in this article will be studied with the aim of explaining of the article as one of the rules of social security, pathology and extending of the law literature of social security. this study shows that, while the 97 section creates and states the new an...
The limitations of each security technology combined with the growth of cyber attacks impact the efficiency of information security management and increase the activities to be performed by network administrators and security staff. Therefore, there is a need for the increase of automated auditing and intelligent reporting mechanisms for the cyber trust. Intelligent systems are emerging computi...
introduction: this research is planning to observe the influence of sense of social security on doctors’ social health in tehran. therefore, it seems that there is a meaningful relationship among doctors’ social health as a dependent variable, and sense of social security of doctors as the main independent variable. also, piety, life satisfaction, social morality and assessing by others as the ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید