نتایج جستجو برای: especially security needs

تعداد نتایج: 778134  

2010
Otto Argueta Bert Hoffmann

It has become commonplace to explain the proliferation of private security services as causally determined by crime rates and institutional weakness. By contrast, this paper argues that another explanatory factor needs to be emphasized, especially for post-war societies: continuity and change of social control mechanisms. The paper first presents the current situation with commercial and noncom...

Journal: :SHS web of conferences 2022

The purpose of Directive 1999/93 / EC on the Community framework for electronic signatures is to facilitate use signatures. Digital are incredibly important as they prevent fraud in e-commerce transactions. A legal established ensure smooth functioning internal market. This article aims interpret European digital Member States shall at least that, when issuing a certificate, certification body ...

Journal: :international journal of information science and management 0
a. sanaye’i ph.d., associate professor at faculty of administrative sciences & economic, university of isfahan

information security is one of the most important enterprise assets. for any organization, information is valuable and should be appropriately protected. also, security is to combine systems, operations, and internal controls to ensure the integrity and confidentiality of data and operation procedures in an organization. knowing the fact that with serious threat of unauthorized users on the int...

Journal: :International Journal of Engineering and Management Research 2020

2002
Ramakrishnan Lakshminarasimhan Jon A. Solworth

Traditionally, the kernel has provided extremely limited protection of network communications. This is especially nettlesome since network connections are the conduits through which the computer systems are most vulnerable. IPSec is now widely available to protect network connections, encrypting network communications in the kernel. But cryptography alone is insufficient to implement end-to-end...

2008
Damjan Kovač Denis Trček

Cooperation between entities in e-business environments is based on trust; therefore trust is an essential precondition for every e-business transaction. Trust is too often treated as a hard security mechanism, which can fail when agents act deceitfully. Trust is a personal and subjective phenomenon and has to be treated accordingly. This especially holds true for emerging service oriented arch...

پایان نامه :دانشگاه تربیت معلم - سبزوار - دانشکده ادبیات و علوم انسانی 1391

abstract this study evaluates the iranian pre-university english textbook in terms of needs, objectives, content, and methodology. the study was designed on the qualitative- quantitative survey basis using interviews and questionnaires, a researcher-made textbook evaluation checklist and a needs analysis questionnaire. the textbook evaluation questionnaire was used in this study to elicit the ...

Journal: :Social Indicators Research 2023

Abstract Equivalence scales are policy parameters for inequality measurement, tax deductions and subsidies. Thus, their accuracy is relevant both budgets social cohesion; however, measurement subject to debate regarding the underlying measure of welfare. Self-assessed insecurities in terms clothing, housing food—or basic needs—imply that at least some households lower levels welfare than those ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید