Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Technologies' Application, Rules, and Challenges of Information Security on Information and Communication Technologies
C Renato, N María - 2015 Asia-Pacific Conference on …, 2015 - ieeexplore.ieee.org
This paper explains the importance of Information Security (IS) in the field of Information and
Communication Technologies (ICT) as well as the use of concepts, standards and …
Communication Technologies (ICT) as well as the use of concepts, standards and …
DESARROLLO DE UN OBSERVATORIO TECNOLÓGICO ENFOCADO A LA SEGURIDAD DE LA INFORMACIÓN PARA INSTITUCIONES DE EDUCACIÓN …
D Vivanco Toala, G Chilán - 2019 - 201.159.223.2
The objective of the study of this research is the development of a technological observatory,
oriented towards information security for higher education institutions. To do this, by …
oriented towards information security for higher education institutions. To do this, by …
Design of an Academic CSIRT–A Proposal Based on Strategic Planning Principles
This work aims to design and implement an organizational model that supports the macro
processes of an academic institution in response to computer incidents to raise the level of …
processes of an academic institution in response to computer incidents to raise the level of …
Design of an Academic CSIRT–A Proposal Based on Strategic Planning
This work aims to design and implement an organizational model that supports the macro
processes of an academic institution in response to computer incidents to raise the level of …
processes of an academic institution in response to computer incidents to raise the level of …
Construcción de un modelo de ciberseguridad para empresas de servicios informáticos que fortalezca un adecuado manejo de incidentes de seguridad
YZ Giraldo Montes - 2021 - repositorio.itm.edu.co
Este proyecto busca construir un modelo de ciberseguridad basado en el análisis de
riesgos, con el objeto de fortalecer un adecuado manejo de incidentes de ciberseguridad …
riesgos, con el objeto de fortalecer un adecuado manejo de incidentes de ciberseguridad …
Seguridad en desarrollo de software
AA Varón Quimbayo - 2021 - repositorio.usam.ac.cr
Una aplicación web es una herramienta totalmente funcional, que se codifica en un
lenguaje soportado por los navegadores, para brindar seguridad a las aplicaciones Web, es …
lenguaje soportado por los navegadores, para brindar seguridad a las aplicaciones Web, es …
[PDF][PDF] Revista electrónica ISSN: 1390-9381 N 11: Julio-septiembre 2017
A Freire, A Lenin - Revista electrónica ISSN - yura.espe.edu.ec
Ecuador currently has an Information Security Management System of the Ecuadorian Navy,
which must protect and safeguard data, discover computer attacks, as well as to execute …
which must protect and safeguard data, discover computer attacks, as well as to execute …
[PDF][PDF] UNIVERSIDAD DE LAMBAYEQUE
HMY Manuel - 2017 - core.ac.uk
The objective of this work is to determine the feasibility of the proposal of a business plan for
the production and marketing of clothing with the aim of improving the economic situation of …
the production and marketing of clothing with the aim of improving the economic situation of …
[PDF][PDF] The terminology of cybercrime. A contribution to the IATE-CvT project (English-Dutch-Spanish)
A De Prijck - libstore.ugent.be
The terminology of cybercrime. A contribution to the IATE-CvT project (English-Dutch-Spanish)
Page 1 Faculteit Letteren & Wijsbegeerte Anke De Prijck The terminology of cybercrime. A …
Page 1 Faculteit Letteren & Wijsbegeerte Anke De Prijck The terminology of cybercrime. A …
[CITÁCIA][C] Implementación de un modelo de aprendizaje automático para el laboratorio de análisis de vulnerabilidades en el CERT Académico de la ESPE
P Almachi, J Francisco, LD Villarreal Campaña…