Buscar
Mostrando ítems 1-10 de 2522
The nature of security: A conceptual framework for integral-comprehensive modeling of IT security and cybersecurity
(2022-06-12)
Cybersecurity is a broadly defined concept comprising security for many different types of elements. Dealing with cybersecurity is a multidimensional problem, and the damage generated by cyberattacks can be very diverse. ...
Security infrastructure technology for integrated utilization of big data : applied to the living safety and medical fields
The Japan Science and Technology Agency (JST) is an independent public body
of the Ministry of Education, Culture, Sports, Science and Technology (MEXT). JST
plays a key role in implementing science and technology policies ...
Diapositivas Clase 1 Ciberseguridad CIC-IPN
(2016-08-17)
Diapositivas Clase 2 Ciberseguridad CIC-IPN
(2016-08-17)
Diapositivas Clase 3 Ciberseguridad CIC-IPN
(2016-08-24)
Security Threats in Volunteer Computing Environments Using the Berkeley Open Infrastructure for Network Computing (BOINC)
(2012-06-01)
Volunteer Computing is a low cost and easy deployable solution for scientific projects that require large amounts of computational power. Volunteer computing public access capabilities comes with several security threats ...
Food security, sweet potato production, and proximity to markets in northern Ghana
(Canadian Science Publishing, 2018)
Demystifying internet of things security : successful iot device/edge and platform security deployment
In 1989 I walked into the Distributed Systems Laboratory as an
undergraduate in the Electrical Engineering department at University of
Pennsylvania and it seemed as if I didn’t leave that lab until I received a
doctorate ...
Enterprise information security risks: a systematic review of the literature
(Institute of Advanced Engineering and ScienceCHE, 2023-05-06)
Currently, computer security or cybersecurity is a relevant aspect in the area
of networks and communications of a company, therefore, it is important to
know the risks and computer security policies that allow a ...