نتایج جستجو برای: security in procedures

تعداد نتایج: 17020606  

2014
Cristian Prisacariu

The actor network procedures of Pavlovic and Meadows are a recent graphical formalism developed for describing security ceremonies and for reasoning about their security properties. The present work studies the relations of the actor network procedures (ANP) to the recent psi-calculi framework. Psi-calculi is a parametric formalism where calculi like spior applied-pi are found as instances. Psi...

2007
Raj GURURAJAN

In the past, the majority of the computer security officers had difficulty in convincing management to allocate financial resources for IT security. However, with the emergence of electronic commerce and varied legislation, organisations appear to have understood the necessity for computer security, especially data security. Currently, in most organisations, security officers focus on IT securi...

2000
Madalina Baltatu Antonio Lioy

This paper presents the network level security services currently available for the Internet infrastructure. Since IPsec is likely to become the largely accepted standard as far as IP level security is concerned, the paper describes the IPsec architecture including its defined security formats and the related key management procedures. Finally, common IPsec applications are presented and the fu...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اراک - دانشکده علوم انسانی 1393

this research study aimed to investigate the relationship between field-dependence/independence cognitive style and vocabulary learning strategies among iranian efl learners. ninety participants majoring in english translation at arak university were chosen. the participants were classified into two groups of field-dependent and independent based on the results of group embedded figure test (ge...

2006
Dirk Willie du Preez Vreda Pieterse

The security of information is important to protect top secret documents for government and private organisations alike. For this reason, many methods have been developed to enforce security and protect access to documents, computers and networks. Some of these methods include policies and procedures. These policies and procedures are compiled according to an Information Security Architecture (...

Journal: :EJIS 2009
Scott R. Boss Laurie J. Kirsch Ingo Angermeier Raymond A. Shingler R. Wayne Boss

Received: 8 April 2008 Revised: 15 August 2008 2nd Revision: 18 January 2009 Accepted: 23 February 2009 Abstract Information security has become increasingly important to organizations. Despite the prevalence of technical security measures, individual employees remain the key link – and frequently the weakest link – in corporate defenses. When individuals choose to disregard security policies a...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شهید چمران اهواز - دانشکده ادبیات و علوم انسانی 1389

methodology non-native participants in this study were sixty ba students majoring in english literature and teaching english as a foreign language at khayyam university of mashhad. they were senior students, between 21 to 24 years old, who had studied english for at least three and a half years and had passed several courses including grammar, reading, conversation, and writing. this was assum...

Journal: :فصلنامه رفاه اجتماعی 0
بهرام پناهی bahram panahi

the research discussed in this article consists of the process ended to propos a structure for social welfare and security which took more than 11 months in social security research institute. the main topics discussed are as follows: 1- the importance of social security and its relationship to economic growth, social justice, human generosity and national honor. 2- the basis and opportunities ...

A. Sharma, B. Yavari, S. Sarami, S. Shahgaldi, S.S. Athari,

In recent decades, biotechnologists have striven to improve the quantity and quality of food supply. Producing genetically modified (GM) foods is one of the main goals and many countries all over the world have approved the distribution and consumption of the labeled GM foods in their own regions. However, there are still few groups having concerns about allergenicity of GM foods. This review h...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید