Administrative and technical solutions to protect computational resources from internal-insiders personnel
Nowadays the organizations know that the computational security in logical, physical, environment security of hardware, software, process of business, data bases, telecommunications, butt in other, are essential not solely for the continuity of the daily operations of the businesses, but also to obt...
Autores principales: | , |
---|---|
Formato: | Artículo |
Lenguaje: | spa |
Publicado: |
Facultad de Contaduría Pública y Administración
2007
|
Materias: | |
Acceso en línea: | https://revistainnovaciones.uanl.mx/index.php/revin/article/view/192 |