نتایج جستجو برای: isms
تعداد نتایج: 386 فیلتر نتایج به سال:
It has become a current requirement in every company regarding the implementation of governance ICT field an effort to improve service quality. For this reason, it is necessary implement and at same time carry out ISMS periodic audit process companies using ISO 27001: 2013 standard. Based on research results found Annex 7 lowest level compared other Annexes, because work instruction documentati...
While comparing the progress of our two research projects of developing an information security management system (ISMS) for federated business process landscapes and the enhancement of security of social networks, we discovered a fundamental view congruency concerning the way information security can be handled. This paper deals with a conceptual framework which uses the ISO 27001 and the Germ...
Can cognitive research generate usable knowledge for elementary science instruction? Can issues raised by classroom practice drive the agenda of laboratory cognitive research? Answering yes to both questions, we advocate building a reciprocal interface between basic and applied research. We discuss five studies of the teaching, learning, and transfer of the “Control of Variables Strategy” in el...
We offer and test a brief psychosocial intervention, Speaking Truth to EmPower (STEP), designed to protect underrepresented minorities' (URMs) intellectual performance and safety in science, technology, engineering, and math (STEM). STEP takes a 'knowledge as power' approach by: (a) providing a tutorial on stereotype threat (i.e., a social contextual phenomenon, implicated in underperformance a...
teremia is still a se ri ous in fec tion in re nal trans plant re cip i ents, with the mor tal ity rate re ported to be 11%.. How ever, un der stand ing of the clin i cal spec trum of bacteremia post re nal trans plan ta tion in Tai wan is lack ing. This study was un der taken in an at tempt to an a lyze the caus ative or gan isms, the sites of pri mary in fec tion, and the pos si ble sig nif i...
Implementation and maintenance of malware protection measures imply high resources usage. Such is the case of Information Security Management Systems (ISMS), whose suggested structure is described by ISO Standard 27.001:2013. In this standard, work with malware is contemplated for penetration testing (pentesting) purposes, allowing to evaluate the response of computer systems against this kind ...
Arabic as a flexion language of the Semitic families has significant differences with Indonesian an agglutinating Austronesian in terms its outward characteristics and structure. Classes ism nouns when examined based on their syntactic linguistics grammatical categories, case, definite, number, gender, it is found that there are many markers. These categories relate to principle concordance or ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید