- [ Ir a la primera página ]
- Anterior
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- Siguiente
- [ Ir a la última página ]
302
303
306
307
308
309
311
313
315
316
317
319
Descripción:
“...Such attacks are known as zero-day attacks, it is for this reason that you want to publicize the mechanisms for managing and mitigating these threats through a methodology review of research, experience and management models for early detection in order to to answer : What is the evolution of computer security today? ...”
320