Security - Security threats? Look inside your company first

被引:0
|
作者
不详
机构
关键词
D O I
暂无
中图分类号
O69 [应用化学];
学科分类号
081704 ;
摘要
引用
收藏
页码:679 / 679
页数:1
相关论文
共 50 条
  • [21] Security threats in IoT
    Dorobantu, Octavia Georgiana
    Halunga, Simona
    [J]. 2020 14TH INTERNATIONAL SYMPOSIUM ON ELECTRONICS AND TELECOMMUNICATIONS (ISETC), 2020, : 155 - 158
  • [22] Security Threats Ahead
    不详
    [J]. MECHANICAL ENGINEERING, 2011, 133 (12) : 16 - 16
  • [23] Analysis of Models of Security to Mitigate the Risks, Vulnerabilities and Threats in a Company of Services of Telecommunications
    Toapanta Toapanta, Segundo Moises
    Mafla Gallegos, Luis Enrique
    Chevez Moran, Maria Jose
    Ortiz Rojas, Javier Gonzalo
    [J]. 2020 3RD INTERNATIONAL CONFERENCE ON INFORMATION AND COMPUTER TECHNOLOGIES (ICICT 2020), 2020, : 445 - 450
  • [24] What is a security? Risks and Threats in the Internet to Human Security
    Rodriguez Prieto, Rafael
    [J]. ARAUCARIA-REVISTA IBEROAMERICANA DE FILOSOFIA POLITICA Y HUMANIDADES, 2016, 18 (36): : 391 - 415
  • [25] A Survey on Security Threats and Security Defenses of Wireless LAN
    Huang, Bo
    Lu, Rui
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INTERNET TECHNOLOGY AND SECURITY (ITS 2010), 2010, : 49 - 52
  • [27] A First Look at Security Risks of Android TV Apps
    Liu, Yonghui
    Li, Li
    Kong, Pingfan
    Sun, Xiaoyu
    Bissyande, Tegawende F.
    [J]. 2021 36TH IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING WORKSHOPS (ASEW 2021), 2021, : 59 - 64
  • [28] Standardizing Industrial IT Security - A First Look at the IEC approach
    Naedele, Martin
    [J]. ETFA 2005: 10TH IEEE INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES AND FACTORY AUTOMATION, VOL 2, PROCEEDINGS, 2005,
  • [29] THE INTERNET INSIDE YOUR COMPANY
    SPROUT, AL
    [J]. FORTUNE, 1995, 132 (11) : 161 - &
  • [30] Are Employees Putting Your Company At Risk By Not Following Information Security Policies?
    Siponen, Mikko
    Mahmood, M. Adam
    Pahnila, Seppo
    [J]. COMMUNICATIONS OF THE ACM, 2009, 52 (12) : 145 - 147