نتایج جستجو برای: internal security
تعداد نتایج: 406278 فیلتر نتایج به سال:
Yer altı, tünel ve mağaralar; kentlerde, kırsalda ülkelerin sınırlarında terör organize suç örgütleri ile kaçakçılar tarafından sıklıkla kullanılan mekânlardır. Özellikle son yıllarda kolluk kuvvetlerinin insansız hava kara araçları gibi keşif gözetleme teknolojilerinden daha fazla istifade etmesi, örgütlerin yer mağara ortamlarını asimetrik avantaj olarak kullanma isteğini da artırmıştır. mağa...
The first two decades of EU counterterrorism policy are emblematic the emergence an internal-external security nexus. This has occurred through EU’s collective securitization terrorism as a transboundary threat that blurs traditional divide between internal and external requiring multidimensional policies practises. status quo discourse primarily national to be dealt with by domestic agencies t...
Once coalition networks are established, the vulnerability of information systems may increase. Internal propagation of a worm with the characteristics of, for example, “Nimbda” or “Code Red” can generate internal broadcast storms behind the network firewalls. There are significant limitations to applying simulation information security issues. Most security vulnerabilities occur at the end poi...
Firms often disclose information security risk factors in public filings such as 10-K reports. The internal information associated with disclosures may be positive or negative. In this paper, we are interested in evaluating how the nature of security risk factors disclosed, which is believed to represent the internal information regarding information security, is associated with future breach a...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید