نتایج جستجو برای: data threats
تعداد نتایج: 2432735 فیلتر نتایج به سال:
The development of cloud computing and distributed technologies has shifted log management operations to an aggregated form. Diverse information devices as well systems perform data collection status analysis through a unified aggregation system. However, with the increasingly diverse business forms, threats confronted by are also mounting, among which leakage, tampering, loss, security vulnera...
With the rapid development of Internet, web applications are becoming more and popular. Many people, groups, organizations, or governments use as a means to share information support business tasks. growing number threats attacks on applications, organizations need effective concept application security. The article is devoted security methods ensuring three-level data protection architecture. ...
there are a lot of researches in the world about attacks on information systems (is). although there have been many attempts to classify threats of is’s especially in health information systems (his), it is still necessary for all health organization to identify new threats and their sources which threaten security of health care domain. the main aim of this paper is to present a research agend...
one of the most important factors in study of project’s , is the study of environmental opportunities factors the permanent study of environmental opportunity factors . the study of permanent environmental changing and knowing golden threats’ cooperate with possible threats and at the result in structure forming and future skeleton of organization has a vital effects . the petrochemical industr...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید