نتایج جستجو برای: key management

تعداد نتایج: 1347875  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تربیت دبیر شهید رجایی - دانشکده علوم انسانی و پایه 1390

the present study aimed at investigating the relationship between iranian efl teachers’ classroom management orientations and their teaching styles. additionally, the difference between male and female teachers’ teaching styles and classroom management orientations and their relationship with experience and age were explored. three hundred efl teachers filled in attitudes and beliefs on classro...

پایان نامه :دانشگاه تربیت معلم - تهران - دانشکده ادبیات و علوم انسانی 1391

abstract global financial crisis has created too many problems in relations among governments. among these problems, the issue of global monetary management, more than every time in the past four decades, has been moved in the center of international economic attentions. a problem which is specially known with the monetary hostility between united states and public republic of china. where ar...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تربیت مدرس 1389

abstract: country’s fiber optic network, as one of the most important communication infrastructures, is of high importance; therefore, ensuring security of the network and its data is essential. no remarkable research has been done on assessing security of the country’s fiber optic network. besides, according to an official statistics released by ertebatat zirsakht company, unwanted disconnec...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه علامه طباطبایی - دانشکده علوم تربیتی و روانشناسی 1393

the purpose of this study was to investigate the relationship between teachers’ class management practices with students’ self- regulated learning and academic self-efficacy. in this study relating to the management class, three dimensions, (training management, people management and behavior management) and three style (interventionist, interactionist and non-interventionist) was considered. r...

2005
Steven M. Bellovin Russell Housley

The question often arises of whether or not a given security system requires some form of automated key management, or whether manual keying is sufficient. This memo proposes guidelines for making such decisions. The presumption is that when symmetric cryptographic mechanisms are used in a protocol, then automated key management is generally but not always needed. If manual keying is proposed, ...

Journal: :international journal of management academy 0
sayyed mohsen allameh university of isfahan, department of management, iran hamed mohammad hashemi master of business administration, center for nonprofit alghadir,tabriz, iran sayyed reza mousavi madras institute of alghadir,tabriz, iran

the purpose of this study is the feasibility of customer relationship management implementation from employees and managers' perspective of melli bank in esfahan city by using structural equation modeling (sem). this study is applicable in terms of purpose and descriptive –survey in terms of method. the sample population of this study was employees and managers of melli bank in esfahan cit...

Journal: :international journal of management academy 0
nazanin taghipoor islam

the aim of this study is assessing the effectiveness of customer relationship management factors in isfahan tourism and travel agencies by structural equation modeling (sem). it is practical according to the goal and it’s a kind of descriptive survey in terms of methodology. research population included all of staffs and managers at tourism and travel agencies in isfahan in 2012 that 274 of the...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه سیستان و بلوچستان 1390

the changes in todays world organization, to the extent that instability can be characterized with the most stable organizations called this afternoon. if you ever change management component, an additional value to the organization was considered, today, these elements become the foundation the organization is survival. the definition of the entrepreneur to identify opportunities to exploit a...

Journal: :journal of computer and robotics 0
mohammad mehdi gilanian sadeghi faculty of computer and information technology engineering, qazvin branch, islamic azad university, qazvin, iran

the computer industry has defined the ieee 802.16 family of standards that will enable mobile devices to access a broadband network as an alternative to digital subscriber line technology. as the mobile devices join and leave a network, security measures must be taken to ensure the safety of the network against unauthorized usage by encryption and group key management. ieee 802.16e uses multica...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید