Zobrazeno 1 - 10
of 260
pro vyhledávání: '"integrated security"'
Publikováno v:
Публічне управління та регіональний розвиток, Iss 24, Pp 628-647 (2024)
The article summarizes international experience and methodical approaches regarding the complex solution of tasks to overcome systemic vulnerabilities in the spheres of influence of hybrid threats and the formation of a national resilience ecosystem.
Externí odkaz:
https://doaj.org/article/6e814aaf36384a69bf3de92a0cd4a675
Autor:
MCCANN, DEIRDRE1 deirdre.mccann@durham.ac.uk
Publikováno v:
Industrial Law Journal. Jul2016, Vol. 45 Issue 2, p244-250. 7p.
Autor:
Evgeny Vladimirovich Gvozdev
Publikováno v:
Недвижимость: экономика, управление, Iss 4 (2023)
The formalized description of the symbolic method (complex numbers) is presented, by means of which the complex value is determined in the form of the level of influence of causal factors on the damage caused by accidents and fires. On the example of
Externí odkaz:
https://doaj.org/article/164be0cde609491f988534a214da94d7
Publikováno v:
Журнал Фронтирных Исследований, Vol 7, Iss 3, Pp 106-117 (2022)
The article identifies the main areas of cooperation between Russia and Kazakhstan in the Caspian Sea region. As the most promising, we see cooperation in fuel and energy industry, military cooperation and humanitarian cooperation in science and high
Externí odkaz:
https://doaj.org/article/6db259fa2a9048c58883394711e15fe3
Autor:
Evgeny Vladimirovich Gvozdev
Publikováno v:
Недвижимость: экономика, управление, Iss 2 (2023)
This article introduces the resources of an enterprise as a rich internal potential, which is aimed at the sustainable functioning of the production process. For the first time, in the form of a problem, a new consolidated methodologically described
Externí odkaz:
https://doaj.org/article/a7b90fe78be1425fb447ce3fbeec2843
Publikováno v:
IEEE Access, Vol 10, Pp 90597-90608 (2022)
An automated risk assessment approach is explored in this work. The focus is to optimize the conventional threat modeling approach to explore software system vulnerabilities. Data produced in the software development processes are better leveraged us
Externí odkaz:
https://doaj.org/article/a91a41311744420886ddf9deee4b833b
Autor:
Stepanek, Laura
Publikováno v:
SDM: Security Distributing & Marketing. Jul2016, p61-76. 13p.
Publikováno v:
SDM: Security Distributing & Marketing. May2016, p67-84. 10p.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Raković, Radoslav
Publikováno v:
European Project Management Journal. 11(1):20-30
Externí odkaz:
https://www.ceeol.com/search/article-detail?id=983543