Search Results - ( factssres OR ( (actor OR altosr) OR (((factorsrsss OR ffactorsrsss) OR also) OR factos) ))*

Refine Results
  1. 1221
  2. 1222
  3. 1223
  4. 1224
  5. 1225
  6. 1226
  7. 1227
  8. 1228
  9. 1229
  10. 1230
  11. 1231
  12. 1232
  13. 1233
  14. 1234
  15. 1235
  16. 1236
  17. 1237
  18. 1238
  19. 1239
  20. 1240

    Soluciones administrativas y técnicas para proteger los recursos computacionales de personal interno-insiders (Administrative and technical solutions to protect computational re... by Pérez, M.T., Palomo González, Miguel Ángel

    Published 2007
    “…Nowadays the organizations know that the computational security in logical, physical, environment security of hardware, software, process of business, data bases, telecommunications, butt in other, are essential not solely for the continuity of the daily operations of the businesses, but also to obtain strategic advantages. If the organization does not worry to place policies of computational security, that does not have control computational security, that does not invest in protection tools, does not update itself in the new problems of internal attacks and that a culture in computational security does not foment, among other aspects, more likely this in a high risk of which some computational resource can be affected by internal personnel and in consequence part or all the Business can let operate. …”
    Get full text
    Article

Search Tools: