Results 71 to 80 of about 2,547,954 (246)
In the paper the usage of the ontological approach, description logics and logical inference to the design of the data model of computer vulnerabilities and attacks is suggested.
Olga Vitalievna Polubelova +1 more
doaj
ORACLE DATABASE SECURITY [PDF]
This paper presents some security issues, namely security database system level, data level security, user-level security, user management, resource management and password management. Security is a constant concern in the design and database development.
Cristina-Maria Titrade
core
Safety Risks Assessment and Security Evaluation of Manufacturing Entities
The article deals with security as a scientific discipline dealing with the assessment of the technical condition of machineries, hazards identification and risks assessment which could lead to fatal consequences.
Kováčová Lucia +4 more
doaj +1 more source
Objective We examined whether 18 months of strength training in individuals with knee varus alignment and medial tibiofemoral osteoarthritis (OA) reduced knee joint loads during walking compared to an attention control group. Methods This study was a secondary analysis of a randomized clinical trial that compared the effects of strength training to a ...
Stephen P. Messier +12 more
wiley +1 more source
Objectives Systemic lupus erythematosus (SLE) is a heterogenous inflammatory condition, with widely varying global prevalence estimates. Frequency of SLE in the general population of Australia has been reported to be notably lower than contemporary estimates in countries such as the US or UK at 19‐39 per 100,000 as opposed to 65‐97 per 100,000.
Lucinda Roper +7 more
wiley +1 more source
An analysis of security issues in building automation systems [PDF]
The purpose of Building Automation Systems (BAS) is to centralise the management of a wide range of building services, through the use of integrated protocol and communication media.
Johnstone, Michael N, Peacock, Matthew D
core +2 more sources
Critical Infrastructure in the National Security System
Aim: To present relationships resulting from legal regulations impacting the effectiveness of critical infrastructure protection, which is a part of the national security system.
Bogdan Kosowski
doaj +1 more source
An examination into the role of knowledge management and computer security in organizations [PDF]
Organisations develop their computer security procedures based on external guidelines such as ISO 17799 with very little provision to incorporate organisational knowledge in their security procedures.
Gururajan, Raj, Gururajan, Vijaya
core
The documentation of component manufacture has become an essential part of today's production processes, especially for the analysis and optimization of production or component design with regard to structural performance, economic efficiency, and sustainability.
Björn Denker +4 more
wiley +1 more source
The role of safety analysis in the safety protection and management system [PDF]
The aim of this paper is to analyze the significance and role of security policy and security projects in the process of organizational security management.
Ivan PEZLAR
doaj

