1
Descripción:
“..., seguridad de la información, amenazas informáticas, gestión de amenazas informáticas.AbstractIn this article...”
2
Autores Cabarique Álzate, Wilmar Alejandro, Salazar Romaña, César Augusto, Quintero Barco, Yeiler Alberto
Publicado 2016-07-19
Descripción:
“... main properties: confidentiality, integrity and availability. The purpose of this article is to show...”Publicado 2016-07-19
3
Descripción:
“... for committing fraud in computer systems with the use of new technologies. This article describes, in general...”
4
Descripción:
“... has become increasingly vital for the development of small businesses. This article presents a...”
5
Autores Pollo Cattaneo, Maria Florencia, López Nocera, Marcelo, Daián Rottoli, Giovanni
Publicado 2015-06-05
Descripción:
“... approaches that can be very different between them according to the types of problems to solve. This article...”Publicado 2015-06-05
6
Autores Vera Solano, Javier Augusto
Publicado 2016-07-19
Descripción:
“... on this activity. The following article focuses on the soil while discussing each of the activities carried out...”Publicado 2016-07-19
7
Descripción:
“... to the community of sectors El Trianón and Las Antillas. In this article, is pretended to do a case study...”
9
10
11
12
13
14
15
16
17
18
19
20