نتایج جستجو برای: is lawful
تعداد نتایج: 7237677 فیلتر نتایج به سال:
Since the 1994 Cairo Conference on Population and Development, the human rights movement has embraced the concept of reproductive rights. These are often pursued, however, by means to which objection is taken. Some conservative political and religious forces continue to resist implementation of several means of protecting and advancing reproductive rights. Individuals' rights to grant and to de...
Cyber decoys provide a means for automating, to a degree, counterintelligence activities and responses to cyber attacks. Like other security mechanisms for protecting information systems, it is likely that cyber decoys will in some instances be misused. In the United States, criminal law provides us with analogies for preventing or punishing improper state use of deception, and criminal and civ...
Syndrome means a set of physical and mental symptoms which is manifestation of a disease or hereditary anomaly and its Persian equivalent is “Neshanegan”. The cause of this phenomenon is a type of disorder in chromosomal arrangement which happens in the embryonic stages and at the time of cell division. Those who suffer Down syndrome include 47 chromosomes instead of 46 chromosomes ...
SPLIT is a simple prototype Lawful Interception software system which is used to evaluate the viability of using both standard network cards and specialised monitoring hardware for the purpose. Lawful Interception requires reliable packet capture, filtering and protocol analysis on high bandwidth links. While standard NICs can take on these various roles, their performance is only adequate in c...
In this paper, attempts will be made to study and understand the lawful and unlawful foods in the light of Islamic Medical law focus on ethical aspect that has been practiced during Islamic civilization. We will realize that lawful and unlawful foods are not, as some imagine, mere pretense, but rather constitute the divine command which protects against many diseases. In order to present such a...
The proliferation of communications over networks based on Internet Protocol (IP) technology imposes ever growing challenges for Law Enforcement Agencies. This Aqsacom White Paper provides an introductory background on the issues behind lawful interception as applied to IP networks and their overlying applications, with emphasis on the dominant applications of E-mail and Voice-Over-IP (VOIP).
Cyber intrusions are rarely met with the most effective possible response, less for technical than legal reasons. Different rogue actors (terrorists, criminals, spies, etc.) are governed by overlapping but separate domestic and international legal regimes. Each of these regimes has unique limitations, but also offers unique opportunities for evidence collection, intelligence gathering, and use ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید