• No se han encontrado resultados

computer security

Aspects and requirements domains applied to computer security

Aspects and requirements domains applied to computer security

... as computer security, informa- tion security, information systems security, information assurance, governance of the security, safety engineer- ing, safety engineering information, ...

6

Strategic Planning for the Computer Security: A Practice Case of an Electrical Research Institute

Strategic Planning for the Computer Security: A Practice Case of an Electrical Research Institute

... place computer workstations in secure areas to protect them from damage, loss, theft, or unauthorized physical ...to Computer Security: The NIST Handbook, 800-30 [17, 18, ...

27

Soft Systems Methodology for the Strategic Planning of the Enterprise Computer Security

Soft Systems Methodology for the Strategic Planning of the Enterprise Computer Security

... Abstract. Soft Systems Methodology (SSM) is a problem-solving methodology employing systems thinking. SSM has been applied to the management, planning, health and medical systems, information systems planning, human ...

13

Methodology of computer security management for the internet of things

Methodology of computer security management for the internet of things

... Introduction. The internet network of things, objects and devices connected to the internet is growing exponentially, due to the fact that the deployment and design of equipment has been carried out in a very diversified ...

13

Computer security

Computer security

... any computer system it is necessary to take security measures that protect its hardware and software and the information it ...prevent computer risks from occurring and to recover the system if it ...

5

Evaluation model for computer security software products based on ISO/IEC 15408 Common Criteria

Evaluation model for computer security software products based on ISO/IEC 15408 Common Criteria

... This article presents a model that enables software developers to evaluate their products under the ISO / IEC 15408 Common Criteria, starting with a risk analysis to several companies in Colombia, selected by the ...

24

Presupuesto Maestro Computer Store

Presupuesto Maestro Computer Store

... PRESPUESTO DE COMPRAS PRESUPUESTO DE EFECTIVO VENTAS COSTO DE VENTAS UTILIDAD BRUTA GASTOS VARIABLES TOTAL VARIABLES MARGEN DE CONTRIBUCIÓN GASTOS FIJOS. TOTAL GASTOS FIJOS[r] ...

12

Security architecture metamodel for Model Driven security

Security architecture metamodel for Model Driven security

... To illustrate the concept of the field and the dispersion of components in composites, machine and processes, we present an example ( Fig. 3 ) which describes an area with three composites and three machines. The ...

16

Security Clean

Security Clean

... para lograr lo propuesto a fin de año. Además, es el principal responsable del cumplimiento de los objetivos por Security Clean. - Control de las campañas Como máximo responsable del departamento, el Director de ...

128

IBM Managed Security Services for Web Security

IBM Managed Security Services for Web Security

... Web Security, el Cliente designará a una persona (denominada "Punto de Contacto del Cliente"), a la cual se dirigirán todas las comunicaciones relacionadas con MSS for Web Security y que tendrá ...

6

Information security

Information security

... The security of information systems is a very complex issue which requires the preparation of stra- tegies that allow information to flow freely, while ensuring the safety of using information systems throughout ...

7

SECURITY INFORMATION

SECURITY INFORMATION

... En la lista de aplicaciones toque Contactos y luego toque el botón [ ] en la esquina inferior derecha para agregar un contacto.. Introduzca la información de contacto como Nomb[r] ...

50

Visión por computadora Computer vision

Visión por computadora Computer vision

... – Detectar la presencia de ciertos objetos en la escena – Determinar la pose de un objeto en la escena. – Determinar qué es fondo y que es frente en la imagen[r] ...

56

CASIO COMPUTER CO., LTD.

CASIO COMPUTER CO., LTD.

... Ejemplo: Para asignar un valor en euros al Value 2 y un valor en dólares al Value 1 para configurar el tipo de conversión siguiente* 1.. 1 euro = 1,1 USD 1[r] ...

14

Department of Computer Science

Department of Computer Science

... Intelligence, Computer Vision and Robotics in order to increase the degree of flexibility and autonomy of current computer applications; and SocVis (Social Computing & Visualization Group), dedicated to ...

11

The Mobile Computer Lab

The Mobile Computer Lab

... *El proyecto de historia es requisito para todos los estudiantes de PACE de 4to y 5to. Todos los proyectos de la Feria de Historia son para el martes 17 de abril a las 7:45 am[r] ...

9

Computer Assisted Language Learning

Computer Assisted Language Learning

... These advantages I will discuss are now considered almost universal and can be found in all the manuals on the subject; specially clear and easy to read is Computers in EngUsh Language[r] ...

8

Computer Forensics: automatización con Autopsy

Computer Forensics: automatización con Autopsy

... El objetivo de este Trabajo Fin de Grado se basa en el estudio y la implementación de Plugins que puedan ser utilizados por Autopsy para conseguir realizar un análisis forense completo [r] ...

167

Lecture 8. Computer Decisions

Lecture 8. Computer Decisions

... Example: cmpa #$FF CMPA #$ FF # Signifies IMMediate addressing mode (IMM) $ Signifies Hexadecimal number Address Data 00FF 0100 81 0101 FF Memory OPERATION PERFORMED: A – $FF ii. R[r] ...

38

Show all 1339 documents...

Related subjects