1
Descripción:
“... in the market with a share of 48.96 %. Vulnerability is also understood as security flaws associated...”
3
Descripción:
“... the general state of information security focused on the zero-day vulnerability is defined and how are you...”
4
Descripción:
“... for companies. In this context, the Systems Management Information Security (ISMS),
which are of great...”
5
Autores Cabarique Álzate, Wilmar Alejandro, Salazar Romaña, César Augusto, Quintero Barco, Yeiler Alberto
Publicado 2016-07-19
Descripción:
“... that the protection and security of them becomes very important in business policies which seek to safeguard three...”Publicado 2016-07-19
6
Descripción:
“.... In this procedure two methodologies are combined €”one is based on the probability of occurrence and the severity...”
8
9
Descripción:
“... to detect evidence about the source of security attacks, so that it can subsequently be taken to a court...”
10
13
Descripción:
“... the environmental impact this activity has brought about for several decades. This analysis shows how inhabitants...”
14
Autores Marín Morales, María Isabel
Publicado 2014-10-27
Descripción:
“... in XML schemas and the second one is based on the usage of ontologies as a knowledge base of several...”Publicado 2014-10-27
15
Autores Trejo Oñate, Jairo Alberto, Hincapié Álzate, Carlos Andrés, Vargas, Richard
Publicado 2014-10-27
Descripción:
“... and expectations in those educational institutions. Existing information is gathered through several raising...”Publicado 2014-10-27
16
Autores Villamizar Suaza, Katerine, Tabares García, John Jairo, Zapata Jaramillo, Carlos Mario
Publicado 2016-07-19
Descripción:
“... of integrated functional testing and user story specification. Several researchers have proposed new techniques...”Publicado 2016-07-19
17
20