Mostrando 1 - 20 Resultados de 20 Para buscar '(severity OR security)', tiempo de consulta: 0.07s Limitar resultados
  • 1
    Descripción: ... in the market with a share of 48.96 %. Vulnerability is also understood as security flaws associated...
  • 2
  • 3
    Autores Guisao, Juan Sebastián, Toro Rendón, Juan Carlos
    Publicado 2015-06-05
    Descripción: ... the general state of information security focused on the zero-day vulnerability is defined and how are you...
  • 4
    Descripción: ... for companies. In this context, the Systems Management Information Security (ISMS), which are of great...
  • 5
    Descripción: ... that the protection and security of them becomes very important in business policies which seek to safeguard three...
  • 6
    Autores Moreno, Juan, Gómez, Jaime
    Publicado 2014-10-27
    Descripción: .... In this procedure two methodologies are combined €”one is based on the probability of occurrence and the severity...
  • 7
  • 8
  • 9
    Descripción: ... to detect evidence about the source of security attacks, so that it can subsequently be taken to a court...
  • 10
  • 11
  • 12
  • 13
    Descripción: ... the environmental impact this activity has brought about for several decades. This analysis shows how inhabitants...
  • 14
    Autores Marín Morales, María Isabel
    Publicado 2014-10-27
    Descripción: ... in XML schemas and the second one is based on the usage of ontologies as a knowledge base of several...
  • 15
    Descripción: ... and expectations in those educational institutions. Existing information is gathered through several raising...
  • 16
    Descripción: ... of integrated functional testing and user story specification. Several researchers have proposed new techniques...
  • 17
  • 18
  • 19
  • 20