Home data security decisions
<p>The most common solution to securing data in the home remains <em>increased awareness</em>. However, studies and increasing numbers of cyberattacks targeting the home point to very limited success of this intervention. Awareness campaigns can lead to information overload, do not...
Үндсэн зохиолч: | Nthala, N |
---|---|
Бусад зохиолчид: | Flechais, I |
Формат: | Дипломын ажил |
Хэл сонгох: | English |
Хэвлэсэн: |
2019
|
Нөхцлүүд: |
Ижил төстэй зүйлс
Ижил төстэй зүйлс
-
How Can Secure Software be Trusted?
-н: Lynn Futcher, зэрэг
Хэвлэсэн: (2011-11-01) -
Analysis of information security technologies for use in the enterprise infrastructure
-н: A. D. Popov, зэрэг
Хэвлэсэн: (2023-02-01) -
Methodological and implementation aspects of introducing secure software development processes
-н: Sas S. Arustamyan, зэрэг
Хэвлэсэн: (2023-05-01) -
Systematic Mapping Study on Security Approaches in Secure Software Engineering
-н: Rafiq Ahmad Khan, зэрэг
Хэвлэсэн: (2021-01-01) -
Exploring How to Apply Secure Software Design Principles
-н: Shouki A. Ebad
Хэвлэсэн: (2022-01-01)