نتایج جستجو برای: security system

تعداد نتایج: 2351256  

Journal: : 2023

The article studies problematic issues of tax security as a part the organization’s economic security. Successful operation company depends on compliance, correct definition function, and timely identification risks. purpose research is to justify role one key parts approaches minimizing risks companies have been analyzed. arbitration practice, letters from Federal Tax Service Russia, various i...

Amir Ashkan Nasiripour, Sina Golesorkhi Somayeh Hamzeh

Background and Goal: ICT development in recent years has created excellent developments in human social and economic life. One of the most important opportunities to use information technology is in the medical field, that the result would be electronic health record (EHR).The purpose of this research is to investigate the effects information securi...

Journal: : 2022

A brief description of the terms "information support" and security" subjects economic activity is given. The necessity ensuring protection information support in system security organizations substantiated. classification attacks risks their occurrence has been carried out. strategies for environment presented.

جاویدی دشت بیاض, محمد حسین, رضوی, فرزاد, شریعتی دهاقان, حسین, عسگریان ابیانه, حسین,

An important factor to be considered in electric power system expansion planning is the security of service that the system is able to provide. In restructured power systems, variables such as agents’ profit or Locational Marginal Price (LMP) variances are considered in transmission expansion planning. To have a secure network this plan would be refined for simulated contingencies. This p...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه صنعتی امیرکبیر(پلی تکنیک تهران) - دانشکده ریاضی و کامپیوتر 1385

از منظر امنیت کامپیوتر، می توان موفقیت سیستم های زیستی در حفظ بقاء و پایداری را بعنوان الگوی مناسبی در نظر گرفت. ابزارها و روشهای متداولی که برای تولید سیستم های محاسباتی قوی استفاده می شوند نمی توانند حتی کوچکترین شکل حیات را به شکل مناسب پیاده سازی نمایند، در حالیکه سیستم های زیستی در طول زمان متکامل شده تا در محیط های گوناگون و در مقابل هجومهای مختلف، زنده بمانند و تکثیر شوند. در این پایان ...

Amir Ashkan Nasiripour, Sina Golesorkhi Somayeh Hamzeh

Background and Goal: ICT development in recent years has created excellent developments in human social and economic life. One of the most important opportunities to use information technology is in the medical field, that the result would be electronic health record (EHR).The purpose of this research is to investigate the effects information securi...

Farhad Lashkarboluki, Farzaneh Sadeghi Ghotbabadi, Majid Najafzadeh, Masoomeh Gholami, Mohammad Reza Honarvar, Naser Behnampour, Zahra Abdollahi,

Background and objectives: Iran was reported in the high-risk group of World Food Security Map in 2008 .Identifying food insecurity is first step for executing interventions. Measuring household food security is its cornerstone. SAMAT System was designed to provide a variety of GIS-based reports to policy makers and managers in the field of food security. Methods and Materials: SAMAT system wa...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه قم 1387

چکیده ندارد.

Journal: :مدیریت فناوری اطلاعات 0
محمدرضا تقوا استادیار دانشکده مدیریت و حسابداری، دانشگاه علامه طباطبایی، تهران، ایران ماندانا ایزدی کارشناس ارشد رشته مدیریت فناوری اطلاعات، دانشگاه علامه طباطبایی، تهران، ایران

the advantages and special characteristics of service oriented architecture and expansion of employing such architecture have brought security topics which are different in some cases from the security principles of traditional information systems. in this article our aim is the examination of various indices of security and the presentation of strategies for security in information systems by ...

A culture conducive to information security practice is extremely important for organizations since information has to be critical assets in modern enterprises. Thus for understanding and improving the organizational behavior with regard to information security, enterprises may look into organizational culture and examine how it affects the effectiveness of implementing ISM. This study aims ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید