نتایج جستجو برای: we cannot reject simply it it seems
تعداد نتایج: 6080334 فیلتر نتایج به سال:
in the first chapter we study the necessary background of structure of commutators of operators and show what the commutator of two operators on a separable hilbert space looks like. in the second chapter we study basic property of jb and jb-algebras, jc and jc-algebras. the purpose of this chapter is to describe derivations of reversible jc-algebras in term of derivations of b (h) which are we...
In this paper we propose a novel approach for the systematic assessment and analysis of IT related risks in organisations and projects. The approach is model-driven using an enterprise architecture as the basis for the security management process. Using an enterprise architecture it is possible to provide an integrated description of an organisation’s structure, processes and its underlying IT ...
IT risk management is an important challenge for businesses and software vulnerabilities are a major source of IT risks, as the 2006 CSI/FBI Computer Crime and Security Survey [GLLR06] demonstrates. According to the survey, many companies consider it important to quantify the losses attacks against their IT systems cause but are unable to do so. In service-oriented architectures, we see a promi...
technical analysis is the forecasting of future price movement based on an examination of past prices. some scientist found that the study of historical prices cannot predict future prices. in this research we intend to study which technical analysis tool is better for prediction of future price movement, for this purpose we are studying two the most strongest technical analysis tools is called...
The use of Information Technology (IT) in organizations is subject to various kinds of potential risks. Risk management is a key component of project management enables an organization to accomplish its mission(s). However, IT projects have often been found to be complex and risky to implement in organizations. The organizational relevance and risk of IT projects make it important for organizat...
payment order in eft can be a negotiable instrument in two ways; it can be an instrument based on custom and regulation meaning that whether it should be considered as new instrument or be incorporated in one of the current instruments. in light of iranian legal system and against common law, it is not acceptable that a new negotiable instrument be created by custom because some characteristics...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید