نتایج جستجو برای: religious cyberspace

تعداد نتایج: 45428  

2015
William D. Bryant

Rigid cyberspace defenses are proving unable to meet advanced and modern cyberspace threats. As a result, there has been increasing focus and interest in cyber resiliency, but what will it take to be resilient in future cyber combat? We can glean some useful concepts from the ancient Japanese proverb about the resiliency of bamboo in a storm. In comparison with the massive oak, which relies on ...

2017
SHAHRAM YAZDANI ZOHREH KHOSHGOFTAR SOLEIMAN AHMADY HASSAN RASTEGARPOUR SEYED ABBAS FOROUTAN

INTRODUCTION Over the past few decades, two revolutionary approaches have emerged as a new form of medical education: Electronic Medical Education and Web-based Medical Education. A number of well-known medical institutions, such as Harvard and Johns Hopkins used a wide range of cyberspace capabilities to increase their competitiveness. Researchers have expressed that cyberspace will change hea...

پایان نامه :دانشگاه آزاد اسلامی - دانشگاه آزاد اسلامی واحد تهران مرکزی - دانشکده ادبیات و علوم انسانی 1390

abstract birbery and corruption and other criminal and as such is one of social phenomena , and i can firmly say that society is protected and safe from harm , this is criminal . eache community is familiar with these crimes and the crime associated ( direct or indirect ) with the political economic , social , and cultural beliefs and religious issues , especially with the community . admitted...

Journal: :Inf. Soc. 2002
Adrian Mihalache

Various spatial metaphors related to cyberspace suffer from two major deŽ ciencies. First, they do not take into account that cyberspace is not a preexistent territory, but an entity that emerges in the process of its development. Second, cyberspace is not a metric space, so that most of the ready-made constructs, like the topologic spaces, cannot be of much use. An interpretation of Blake’s wo...

2016
Scott D. Lathrop Stoney Trent Robert Hoffman George G. Meade

Cyberspace operations are dependent upon highly sophisticated technology. Unfortunately, it is challenging to find or develop solutions that successfully support critical processes and decisions. Innovation, and the resources associated with innovation, appear to focus primarily on the technology with little emphasis on the human factors associated with employment, training, and sustainment of ...

Journal: :JNW 2012
Bing Chen Chengxiang Tan Bo Jin Xiang Zou Yuebo Dai

With the moving development of networks, especially Internet of Things, electronic identity administration in cyberspace is becoming more and more important. And personal identity management in cyberspace associated with individuals in reality has been one significant and urgent task for the further development of information construction in China. So this paper presents a RFID-based electronic...

Journal: : 2022

The development of information and communication technologies has led to the accelerated society, but with facilitation communication, business entertainment, there have been a number problems regarding security users in cyberspace, also states themselves. Cybercrime become frequent occurrence that causes material non-material damage social media who are often insufficiently informed about meth...

2001
WOLFRAM PROKSCH

The existing border-less cyberspace is mainly the result of the open network architecture of IPv4. This structure does not obey principles of territorial jurisdiction of states. The Yahoo! case demonstrates needs of states and existing limits of IPv4. IPv6 offers extensive geographic tracking allowing a nationalisation of cyberspace. In the future, content filtering may be replaced by blocking ...

پایان نامه :دانشگاه تربیت معلم - تهران - دانشکده علوم انسانی 1393

this study investigates the problem of translating religious allusions in persian literature, namely the ones borrowed from quranic verses and hadiths. the purpose of this study is to shed light on how different translators dealt with such a task and also to provide guidelines for translators in coping with religious allusions.

2015
Keith D. Willett

The Department of Defense Strategy for Operating in Cyberspace (DSCOC) calls out the need for active cyber defense (ACD). The function of ACD is to provide sensing, sense-making, decision-making, and acting in cyber-relevant time in order to provide cyberspace defense before an adversary is able to bring about their desired effect. As automation increases and we move ever closer to automated cy...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید