Buscar
Mostrando ítems 1-10 de 152
End-to-end security in embedded system for modern mobile communication technologies
(Elsevier, 2022-07-19)
Modern mobile electronic devices such as smartphones or cell phones can now be used for distant devices such as technical systems to monitor and control. While surveillance systems do not require high standards navigating ...
Uma Solução para Avaliação de Riscos em Aplicativos para Dispositivos Móveis
(Universidade Federal do PampaCampus Bagé, 2015)
Avaliação do impacto de segurança de dispositivos móveis via abordagem fuzzy
(Universidade Tecnológica Federal do ParanáCuritibaBrasilPrograma de Pós-Graduação em Computação AplicadaUTFPR, 2019-08-13)
Smartphones and tablets are commonly used equipment for personal purposes as well as for work-oriented activities. The number of companies that adopt the policy of allowing their users to use their own equipment to carry ...
Vulnerabilidade das informações empresariais através do uso de dispositivos móveis
(Universidade Tecnológica Federal do ParanáCuritibaBrasilEspecialização em Gestão EmpresarialUTFPR, 2015-08-14)
Objective: Describe security strategies of information and the vulnerabilities arising from the use of mobile devices in the analyzed organization. Methods: Case study through qualitative research with technical area, ...
Metodología para la selección de herramientas eficientes y protocolos adecuados para mejorar la seguridad de los dispositivos móviles
(2017)
Currently there are tools to protect the information contained in mobile devices, many users are unaware of the risks involved in not using the appropriate protection measures; On the other hand there are international ...
Guia de segurança para dispositivos móveis: hardware, software e comportamento
(Universidade Tecnológica Federal do ParanáCuritibaBrasilDepartamento Acadêmico de InformáticaTecnologia em Sistemas para InternetUTFPR, 2014-01-24)
This text presents good pratice of information security, to anyone who interacts in any form with a mobile device, from IT professionals involved with information security to users and entrepreneurs interested in protect ...