نتایج جستجو برای: isms
تعداد نتایج: 386 فیلتر نتایج به سال:
امروزه اطلاعات نقش سرمایه یک سازمان را ایفا می کند و حفاظت از اطلاعات سازمان یکی از ارکان مهم بقای آن است. سیستم مدیریت امنیت اطلاعات حفاظت از اطلاعات را در سه مفهوم خاص محرمانه بودن اطلاعات، صحت اطلاعات و در دسترس بودن اطلاعات تعریف می نماید. بسیاری از شکست های پیاده سازی isms ریشه در مسائل سازمانی، عدم توجه کافی به موانع سر راه و وضعیت آمادگی سازمان قبل از پیاده سازی است. روش تحقیق حاضر، توصی...
We present two instantiations of generic Interactive State Machines (ISMs) with mobility features which are useful for modeling and verifying dynamically changing mobile systems. ISMs are automata with local state exchanging messages simultaneously on multiple buffered ports. A system of generic ISMs also deals with global state used e.g. to describe their communication topology. We introduce A...
OBJECTIVE Intraspinal microstimulation (ISMS) is a promising method for reanimating paralyzed limbs following neurological injury. ISMS within the cervical and lumbar spinal cord is capable of evoking a variety of highly-functional movements prior to injury, but the ability of ISMS to evoke forelimb movements after cervical spinal cord injury is unknown. Here we examine the forelimb movements a...
Background ISMS'S bylaws state that its purpose "... is to foster the development, dissemination, and implementation of knowledge, basic and applied research, and science and technologies that improve the understanding and practice of marketing. " Note the emphasis on implementation and on practice. The Society's goals are well served by its journal, Marketing Science, and it has recognized out...
Society is increasingly dependent on Information Security Management Systems (ISMS), and having these kind of systems has become vital for the development of Small and Medium-Sized Enterprises (SMEs). However, these companies require ISMS that have been adapted to their special features and have been optimized as regards the resources needed to deploy and maintain them, with very low costs and ...
While Information Security Management Systems (ISMS) are being adopted by the biggest IT companies, it remains quite difficult for smaller entities to implement and maintain all the requirements of ISO/IEC 27001. In order to increase information security in Luxembourg, the Public Research Centre Henri Tudor has been charged by the Luxembourg Ministry of Economy and Foreign Trade to find solutio...
At a press conference on 29 April 2004 there were gasps of awe from the audience as we announced that four clients of ours based in that country had achieved BS 7799-2 [1] attestation in less than four months each from a standing start. 1. Management BS 7799-2:2002 is a management standard. It is a tool for executive directors (and senior managers) and requires their leadership, involvement and...
A wide variety of different techniques and technologies are potentially applicable for ISMS insider intrusion prevention and detection. In this report we examine three approaches that have not been reviewed in any great detail recently, namely: simulation and modelling, scenario gaming and game theory, and artificial learning technologies. We show how each of these diverse approaches might be a...
In this work we address the use of realtime cortical recordings for the generation of coherent, reliable and robust motor activity in spinal-lesioned animals through selective intraspinal microstimulation (ISMS). The spinal cord of adult rats was hemisectioned and groups of multielectrodes were implanted in both the central nervous system (CNS) and the spinal cord below the lesion level to esta...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید