Buscar
Mostrando ítems 31-40 de 3401
Evaluation and prioritization of information security controls of ISO/IEC 27002:2013 for SMEs Through Fuzzy TOPSIS
(Springer Science and Business Media Deutschland GmbHGermany, 2022)
Controle de acesso a recursos computacionais de forma flexível e dinâmica através de contexto
(Universidade Federal de Santa MariaBREngenharia de ProduçãoUFSMPrograma de Pós-Graduação em Engenharia de Produção, 2010-03-30)
A model of access control aims to limit the actions that a User can have legitimate in a system. Its purpose is to improve security by ensuring the properties of integrity and confidentiality. The model of access control ...
Políticas de segurança física e lógica em ambientes institucionais que utilizam tecnologia da informação
(Universidade Tecnológica Federal do ParanáCuritibaDepartamento Acadêmico de Eletrônica, 2011-11-26)
This is an explanatory and applied research about security policies to business environment, in which the bibliographic method was used. The aim of this paper is to describe guidelines of physical and logical security to ...
Análise e implantação de uma ferramenta de gestão de tratamento de incidentes de segurança da informação
(Universidade Federal do Pampa, 2017)
Organization and dynamics of Conselho Municipal de Seguranca Alimentar e Nutricional de Sao Paulo: implications of their participation on the creation of a municipal food and nutrition security policy
(PONTIFICIA UNIVERSIDADE CATOLICA CAMPINASCAMPINAS, 2012)
Objective This study analyzed the internal functioning, organization and political participation of the local food and nutrition security council and possible implications of their participation on the creation of a municipal ...
Security preserving program translations.
(Udelar. FI., 2018)
The analysis of information flow has become a popular technique for ensuring the confidentiality of data. It is in this context that confidentiality policies arise for giving guarantees that private data cannot be inferred ...
Diagnóstico de la frontera Ecuador-Colombia (Informe Especial)
(Quito: Universidad Andina Simón Bolívar, Corporación Editora Nacional, 2002)
Este documento describe la situación actual imperante en la frontera, en el lado ecuatoriano, concretamente en las provincias de Esmeraldas, Carchi y Sucumbíos, tomando en cuenta cuatro áreas temáticas: presencia institucional ...
Estudo sobre a gestão da política de segurança da informação no Poder Judiciário do estado do Tocantins
(Universidade Federal do TocantinsBRPrograma de Pós-Graduação em Modelagem Computacional de Sistemas - PPGMCSPalmas, 2021)
Methodology for Computer Security Incident Response Teams into IoT Strategy
At present, the Colombian government shares information on threats or vulnerabilities in the area of cybersecurity and cyberdefense, from other government agencies or departments, on an ad-hoc basis but not in real time, ...