نتایج جستجو برای: 2005 hence
تعداد نتایج: 306045 فیلتر نتایج به سال:
Compliance with law, industry standards, and corporate governance regulations are one of the driving factors for discovering security requirements. This paper aims to incorporate constraints from regulations through security requirements at an early stage of development. Constraints are extracted using a pattern based approach from legal texts of information security laws and policies derived f...
This paper describes different proposals made at UNED, for post-graduated students, at the area of IT Services Management and specially trying to fill the gap, of paramount importance, of the treatment due in ITIL® (Information Technology Infrastructure Library) to Information Security Management. We analyze the treatment given to Information Security Management in ITIL, both versions 2 and 3, ...
In this paper, after giving a brief definition of Information Security Management Systems (ISMS), ISO 27001, IT governance and COBIT, pros and cons of implementing only COBIT, implementing only IS
This paper describes a technical security analysis which is based on experiments done in a laboratory and verified in a physician’s practice. The health care telematics infrastructure in Germany stipulates every physician and every patient to automatically be given an electronic health smart card (for patients) and a corresponding health professional card (for health care providers). We analyze...
Adults and immatures of Diaphorina teucrii sp. nov. (Hemiptera, Liviidae, Euphyllurinae) and adults of Tamarixia dorchinae sp. nov. (Hymenoptera, Eulophidae, Tetrastichinae) from Israel are described, diagnosed and illustrated. D. teucrii sp. nov. develops on Teucrium capitatum (Lamiaceae), representing a family which was previously not recorded as a psyllid host from Israel, and is parasitised...
The phenology of parasitism of the cereal leaf beetle, Oulema melanopus (L.) (Coleoptera: Chrysomelidae) by Tetrastichus julis (Walker) (Hymenoptera: Eulophidae) was studied in small grain fields from 2000 to 2005 in northern Utah, after release and redistribution of the partially bivoltine larval parasitoid during the 1990s. Host larvae first occurred in May, with peak infestation typically oc...
Abstract In recent years, land use changes in Kon Tum province have been significantly transformation. Hence, there is an urgent need for Land Use/Land Cover (LULC) change assessment during two decades. The present study employed GIS technique to examine potential different land-use types between 2005-2010, 2010-2015 and 2015-2020 periods. To do this, several LULC maps representing the existing...
BfArM acknowledges the submission of the manuscript by Backman et al. (2005) concerning the occurrence of breast cancer associated with Mirena use. The manuscript was scheduled for publication in October 2005 and meanwhile has been published (Backman T. et al. Use of the Levonorgestrel-releasing intrauterine system and breast cancer. Obstet and Gynecol 2005;106:813-7). Unfortunately, the study ...
Disaster Management Agency (BNPB) reported more than 100 landslide cases in the Bogor area from January to April 2018. Topography and high rainfall intensity are predicted as main factor occurrence Bogor. This study aims develop vulnerability map evaluate its accuracy based on field's points. The methods proposed by Directorate of Volcanology Mitigation, namely DVMBG 2004 2005, used this study....
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید