Physical security measures framework for Marib power plant (Yemen)
| Auteur principal: | Mohammed Al-Aghbari, Anas Mustafa |
|---|---|
| Format: | Thèse |
| Publié: |
2013
|
| Sujets: |
Documents similaires
Physical security measures framework for Marib power plant
par: Mohammed Al-Aghbari, Anas Mustafa
Publié: (2013)
par: Mohammed Al-Aghbari, Anas Mustafa
Publié: (2013)
Information security awareness framework for enhancing security privacy among twitter users
par: Saeed Hussein, Abbas Yaslam
Publié: (2017)
par: Saeed Hussein, Abbas Yaslam
Publié: (2017)
Information security curriculum framework at undergraduate level
par: Sanusi Arifin, Ab. Arif
Publié: (2009)
par: Sanusi Arifin, Ab. Arif
Publié: (2009)
An enhanced next generation security operation center framework for information system security management
par: Yau, Ti Dun
Publié: (2023)
par: Yau, Ti Dun
Publié: (2023)
Privacy-preserved security-conscious framework to enhance web service composition
par: Movahednejad, Homa
Publié: (2016)
par: Movahednejad, Homa
Publié: (2016)
Model based framework for measuring service level agreement performance in service oriented architecture
par: Ahmad Al-Sakkaf, Alawi Abdullah
Publié: (2013)
par: Ahmad Al-Sakkaf, Alawi Abdullah
Publié: (2013)
ICT service quality measurement framework for Malaysian universities context
par: Nor, Rozi Nor Haizan
Publié: (2013)
par: Nor, Rozi Nor Haizan
Publié: (2013)
Designing a logical security framework for enterprise service oriented architecture (ESOA)
par: Kalantari, Alaeddin
Publié: (2009)
par: Kalantari, Alaeddin
Publié: (2009)
Implementing Additional Security Measure on ATM Through Biometric
par: Azeez, Hayder Hussein
Publié: (2011)
par: Azeez, Hayder Hussein
Publié: (2011)
A conceptual framework of information security database audit and assessment in university based organization
par: Ul Hasan, Muneeb
Publié: (2018)
par: Ul Hasan, Muneeb
Publié: (2018)
Secure framework for implementing close circuit television (CCTV) system as a crime prevention tool : case study (Malaysia)
par: Achin, Hamidi
Publié: (2008)
par: Achin, Hamidi
Publié: (2008)
Control priorization model for improving information security risk assessment
par: Al-Safwani, Nadher Mohammed Ahmed
Publié: (2014)
par: Al-Safwani, Nadher Mohammed Ahmed
Publié: (2014)
Development of metamodel for information security risk management
par: Mohammed Ba Muqabel, Mohammed Salem
Publié: (2013)
par: Mohammed Ba Muqabel, Mohammed Salem
Publié: (2013)
Efficient Queue And Gsi Security
Management Framework For Mobile
Desktop Grid
par: Sarwar, Muhammad Imran
Publié: (2008)
par: Sarwar, Muhammad Imran
Publié: (2008)
The implementation framework for automated model transformation in model driven development
par: Khalefa, Mustafa S.
Publié: (2009)
par: Khalefa, Mustafa S.
Publié: (2009)
Development of computer ethical framework for information security (educational context)
par: Namayander, Meysam
Publié: (2009)
par: Namayander, Meysam
Publié: (2009)
Secure-Spin with hashing to support mobility and security in wireless sensor network
par: Amri, Mohammad Hossein
Publié: (2013)
par: Amri, Mohammad Hossein
Publié: (2013)
Information security compliance assessment using information security maturity model
par: Zadeh, HassanHossein
Publié: (2014)
par: Zadeh, HassanHossein
Publié: (2014)
Integrated Framework For Secure Distributed Management Of
Duplicated Ipv6 Address Detection
par: Ul Rehman, Shafiq
Publié: (2017)
par: Ul Rehman, Shafiq
Publié: (2017)
Triple scheme based on image steganography to improve imperceptibility and security
par: Hashim, Mohammed Mahdi
Publié: (2022)
par: Hashim, Mohammed Mahdi
Publié: (2022)
IT supported project based learning framework
par: Mohammed Hamouda, Mohammed Elgasim
Publié: (2010)
par: Mohammed Hamouda, Mohammed Elgasim
Publié: (2010)
Factors influencing security measures in IT outsourcing
par: Zainal, Mohd. Zairusham
Publié: (2014)
par: Zainal, Mohd. Zairusham
Publié: (2014)
Assessing cloud computing security level of awareness among IT and non IT students in UTM
par: Mohammed, Alwuhayd Muteb
Publié: (2014)
par: Mohammed, Alwuhayd Muteb
Publié: (2014)
Measurement metrics for measuring success of business intelligence system
par: Sangar, Amin Babazadeh
Publié: (2014)
par: Sangar, Amin Babazadeh
Publié: (2014)
Using TAM to study the user acceptance of it in the Yemeni public sector (Ministry of Social Affairs and Labour-Yemen)
par: Saeed Wahdain, Esmat Abdulmajid
Publié: (2014)
par: Saeed Wahdain, Esmat Abdulmajid
Publié: (2014)
I-Personal Financial Organizer (I-Pfo): A Cyber Security Framework For I-Pfo.
par: Annie Ng, Ai Bee
Publié: (2010)
par: Annie Ng, Ai Bee
Publié: (2010)
Integrating security services into active network
par: Mandala, Satria
Publié: (2005)
par: Mandala, Satria
Publié: (2005)
A dimension-based information security culture model for information security policy compliance behavior in Malaysian public universities
par: Akhyari, Nasir
Publié: (2019)
par: Akhyari, Nasir
Publié: (2019)
An analysis on security awareness of social networks users
par: Darvishi, Mahdi
Publié: (2013)
par: Darvishi, Mahdi
Publié: (2013)
A network security management approach for WLAN
par: Janbeglou , Maziar
Publié: (2010)
par: Janbeglou , Maziar
Publié: (2010)
Awareness and acceptance analysis of information security policy
par: Muda, Mohd. Zuki
Publié: (2010)
par: Muda, Mohd. Zuki
Publié: (2010)
Simulation of physical forces for wet clothing
par: Abdullah, Omar Salim
Publié: (2013)
par: Abdullah, Omar Salim
Publié: (2013)
Regression testing framework for test cases generation and prioritization
par: Osman, Eglal Mohammed Khalifa
Publié: (2022)
par: Osman, Eglal Mohammed Khalifa
Publié: (2022)
Improving information system security by evaluating human factors
par: Soltanmohammadi, Saeed
Publié: (2013)
par: Soltanmohammadi, Saeed
Publié: (2013)
Enabling security for service discovery in pervasive computing environments
par: Sharifi, Mahdi
Publié: (2009)
par: Sharifi, Mahdi
Publié: (2009)
WINPCAP : design and development of covert channel for secure communication
par: Omar, Syaril Nizam
Publié: (2007)
par: Omar, Syaril Nizam
Publié: (2007)
Detecting plaintext recovery attack in secure shell (SSH)
par: Ahmad Baidowi, Zaid Mujaiyid Putra
Publié: (2010)
par: Ahmad Baidowi, Zaid Mujaiyid Putra
Publié: (2010)
Employees' awareness towards IT security measures implemented in their organization : selected financial institution
par: Krishnakutty, Premala Nair
Publié: (2016)
par: Krishnakutty, Premala Nair
Publié: (2016)
Physics based modeling and simulation of collision response
par: Abdul Rab, Abdul Rab
Publié: (2004)
par: Abdul Rab, Abdul Rab
Publié: (2004)
Towards a power consumption estimation model for routers over TCP and UDP protocols
par: Mohammed, Ali Qusay
Publié: (2015)
par: Mohammed, Ali Qusay
Publié: (2015)
Documents similaires
-
Physical security measures framework for Marib power plant
par: Mohammed Al-Aghbari, Anas Mustafa
Publié: (2013) -
Information security awareness framework for enhancing security privacy among twitter users
par: Saeed Hussein, Abbas Yaslam
Publié: (2017) -
Information security curriculum framework at undergraduate level
par: Sanusi Arifin, Ab. Arif
Publié: (2009) -
An enhanced next generation security operation center framework for information system security management
par: Yau, Ti Dun
Publié: (2023) -
Privacy-preserved security-conscious framework to enhance web service composition
par: Movahednejad, Homa
Publié: (2016)