نتایج جستجو برای: security level
تعداد نتایج: 1235388 فیلتر نتایج به سال:
the issue of unit commitment is one of the most important economic plans in power system. in modern and traditional power systems, in addition to being economical of the planning, the issue of security in unit operation is also of great importance. hence power system operation confronts units’ participation and input considering network security constrains. the issue of units’ participation is ...
various and complex human activities in geographical contexts need proper ground if at most efficiency is to be achieved. land preparation regulates the relationship between human, space, and human activities. land preparation has various dimensions related to value system, political, scientific, artistic, and defense-security aspects. one of the most important dimensions of land preparation is...
about half of the population in pakistan is food insecure. the study focused the food secure population and the strategies for reducing poverty in district rawalpindi. the study was carried out in district rawalpindi in the punjab province of pakistan. simple random sampling technique was used for this research study in district rawalpindi. a sample of 120 respondents was selected. then the dat...
Introduction..................................................................... Security Strata................................................................. Low-Level Security Needs.......................................... Mid-Level Security Needs .......................................... High-Level Security Needs......................................... A Security Platform................
Security is an increasingly important issue for networked services. However, since networked environments may exhibit varying networking behavior and contain heterogeneous devices with varying resources tunable security services are needed. A tunable security service is a service that provides different security configurations that are selected, and possibly altered, at run-time. In this paper,...
Purpose – The purpose of this paper is to examine security incident response practices of information technology (IT) security practitioners as a diagnostic work process, including the preparation phase, detection, and analysis of anomalies. Design/methodology/approach – The data set consisted of 16 semi-structured interviews with IT security practitioners from seven organizational types (e.g. ...
Multi-cloud applications, i.e. those that are deployed over multiple independent Cloud providers, pose a number of challenges to the security-aware development and operation. Security assurance in such applications is hard due to the lack of insights of security controls applied by Cloud providers and the need of controlling the security levels of all the components and layers at a time. This p...
The security goals of an organization are realized through security policies, which concern physical security, digital security and security awareness. An insider is aware of these security policies, and might be able to thwart the security goals by combining physical, digital and social means. A systematic analysis of such attacks requires the whole environment where the insider operates to be...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید