Search Results - ( factssres OR ( (actor OR altosr) OR (((factorsrsss OR ffactorsrsss) OR also) OR factos) ))*
Suggested Topics within your search.
Suggested Topics within your search.
- 17
- México 17
- Mexico 12
- política 9
- redes sociales 9
- comunicación política 8
- political communication 8
- Nuevo León 7
- Educación Superior 6
- Violencia 6
- democracia 6
- educación 6
- espacio público 6
- shrimp 6
- television 6
- televisión 6
- Artificial Intelligence 5
- COVID-19 5
- Competitividad 5
- Educación 5
- Higher Education 5
- Inteligencia Artificial 5
- Mediación 5
- Violence 5
- communication 5
- comunicación 5
- democracy 5
- estudiantes 5
- identidad 5
- migración 5
-
1221
-
1222
Impulsando la Sostenibilidad: Factores Clave en la Industria Automotriz Mexicana
Published 2025Get full text
Article -
1223
-
1224
-
1225
-
1226
El grabador checoeslovaco Koloman Sokol (1902–2003) en México y su enseñanza
Published 2021Get full text
Article -
1227
La Capacitación como Estrategia de Crecimiento de las Pymes en México
Published 2018Get full text
Article -
1228
-
1229
Análisis de redes de co-ocurrencia sobre la intención de voto en Monterrey, México
Published 2025Get full text
Article -
1230
El arte como actividad práxica en el pensamiento de Severo Iglesias
Published 2023Get full text
Article -
1231
-
1232
-
1233
-
1234
-
1235
-
1236
-
1237
The hasukjip: situation in 2020 in the Republic of Korea and abroad
Published 2024Get full text
Article -
1238
-
1239
-
1240
Soluciones administrativas y técnicas para proteger los recursos computacionales de personal interno-insiders (Administrative and technical solutions to protect computational re...
Published 2007“…Nowadays the organizations know that the computational security in logical, physical, environment security of hardware, software, process of business, data bases, telecommunications, butt in other, are essential not solely for the continuity of the daily operations of the businesses, but also to obtain strategic advantages. If the organization does not worry to place policies of computational security, that does not have control computational security, that does not invest in protection tools, does not update itself in the new problems of internal attacks and that a culture in computational security does not foment, among other aspects, more likely this in a high risk of which some computational resource can be affected by internal personnel and in consequence part or all the Business can let operate. …”
Get full text
Article