نتایج جستجو برای: security

تعداد نتایج: 178415  

Journal: :Acta Electrotechnica et Informatica 2014

Journal: :Scientific Notes of Taurida National V.I. Vernadsky University. Series: Economy and Management 2020

Journal: :International Journal of Information Systems and Informatics 2023

The insecurity of cloud leads to loss or exposure vital information thereby threatens online transactions. These unfortunate happenings resulted in financial loss, reduced patronage services and investment diversions. Therefore, this chapter assesses security electronic transaction security. adopts qualitative research method, data were sourced secondarily through content analysis edited books,...

Anatolii Mysyk Ivan Tkach Kateryna Plutytska Serhii Drobotov Svitlana Bondarenko,

The purpose of this study is theoretical and methodological substantiation, deepening of conceptual provisions and development of scientific and practical recommendations for the formation of an integrated sector of national security and defense based on the principles of national resilience. The relevance of this study is due to the need to build national resilience to address the main problem...

Journal: :Journal of Geography, Politics and Society 2019

Journal: :The Quality Assurance Journal 2000

Journal: :Proceedings of the ... International Conference on Business Excellence 2022

Abstract This article takes into consideration cyber security economics to understand whether and is a partnership among equals or any of these two disciplines have the upper hand. Cyber more than just computer science, studies in holistic way, it dynamic cross disciplinary matter involving psychology, forensic, sociology, etc. The argument that there no clear definition cybersecurity, apart fr...

This article presents the key insights about the environment and security links in the context of the Persian Gulf region. This research paper focuses on the challenge of finding a balance among development, armed conflicts and environmental degradation in the Persian Gulf region. Environmental security challenges are human security, sustainable development and regional cooperation in the Persi...

To evaluate and predict component-based software security, a two-dimensional model of software security is proposed by Stochastic Petri Net in this paper. In this approach, the software security is modeled by graphical presentation ability of Petri nets, and the quantitative prediction is provided by the evaluation capability of Stochastic Petri Net and the computing power of Markov chain. Each...

Background and Objective: Information security is of vital importance in most organizations. This is especially central in academic libraries due to the specific type of visitors, exchange and transfer of information to the users. Thus, the purpose   is to investigate the relationship of the development of library software and information security management in the libraries of Islamic Azad Uni...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید