Results 21 to 30 of about 319,488 (211)

SCHOOL SHOOTING:CLASSIFICAÇÃO, CONSEQUÊNCIAS DO EXTREMISMO, ESTATÍSTICAS, MEDIDAS A SEREM TOMADAS E O QUE NÃO FAZER

open access: yesVertentes do Direito
O presente estudo pretende analisar um contexto particularmente considerado novo no território brasileiro: o school shooting, que em tradução livre pode ser definido como tiros em escola ou ambientes escolares.
Jonatas dos Santos Silva   +2 more
doaj   +1 more source

Efficient and model‐agnostic parameter estimation under privacy‐preserving post‐randomization data

open access: yesCanadian Journal of Statistics, Volume 53, Issue 3, September 2025.
Abstract Balancing data privacy with public access is critical for sensitive datasets. However, even after de‐identification, the data are still vulnerable to, for example, inference attacks (by matching some keywords with external datasets). Statistical disclosure control (SDC) methods offer additional protection, and the post‐randomization method ...
Qinglong Tian, Jiwei Zhao
wiley   +1 more source

As mulheres sob ataque:

open access: yesCadernos de Gênero e Diversidade, 2022
Este artigo teórico tem como objetivo discutir a relação entre o novo modelo neoliberal, o conservadorismo e a desdemocratização com a retirada de direitos e os ataques às políticas de gênero. Este novo modelo, que propõe não só uma política econômica, mas também uma racionalidade conservadora e antidemocrática tem como lastros a chamada ideologia de ...
Emanuele Mantovani   +1 more
openaire   +1 more source

Not All Heroes Wear Capes: Cyber Resilience of the Social Administration at a Swedish Municipality

open access: yesRisk, Hazards &Crisis in Public Policy, Volume 16, Issue 3, September 2025.
ABSTRACT This study examines the role of crisis management as an enabling practice for organizational cyber resilience within the public sector. Taking a stakeholder perspective, this qualitative case study analyzes how a Swedish municipal social administration, which was the victim of a ransomware attack that escalated into a crisis, managed to ...
Anton Holmström, Christine Große
wiley   +1 more source

Diseño de circuitos integrados y seguridad de circuitos criptográficos frente a ataques [PDF]

open access: yes, 2016
Muchos sistemas electrónicos incorporan dispositivos criptográficos que implementan algoritmos que cifran la información almacenada. Pero aun cuando los algoritmos sean muy seguros, estos dispositivos pueden llegar a revelar cierta información debido a ...
Baena Oliva, María del Carmen   +6 more
core  

The Told Story of the Gaza War

open access: yesWorld Affairs, Volume 188, Issue 3, Fall 2025.
ABSTRACT All violent conflicts and wars involve at least two competing narratives. This is also the case for the conflict commonly referred to as the Gaza War, which began on October 7, 2023, and lasted 471 days until the first phase of the ceasefire was implemented. The war involved, on one side, Israel with substantial support from the United States,
Daniel Bar‐Tal
wiley   +1 more source

Técnica de protección para credenciales de autenticación en redes sociales y correo electrónico ante ataques phishing

open access: yesPublicaciones e Investigación, 2018
Una credencial de autenticación es una orden que autoriza el acceso a una red social, correo electrónico u otros sitios web que requieren información personal de un usuario registrado.
Paola Andrea Noreña Cardona   +1 more
doaj   +1 more source

Diseño del sistema de gestión de seguridad de la información para el Grupo Empresarial La Ofrenda [PDF]

open access: yes, 2013
El número de atacantes de las redes y de los sistemas en las organizaciones es cada vez mayor, frente a esta situación, un 46% de usuarios afirmó haber recibido un mensaje fraudulento que afirmaba provenir de servicios de correo electrónico como Yahoo ...
Aguirre Cardona, Juan David   +1 more
core  

No Limits: The Biden Administration's Support for Israel's War on Gaza

open access: yesWorld Affairs, Volume 188, Issue 3, Fall 2025.
ABSTRACT The war in Gaza that Israel launched in response to the Hamas‐led attack in southern Israel on October 7, 2023, has been the longest and deadliest war in the history of the Israeli‐Palestinian conflict and one of the most lethal and destructive in recent history.
Dov Waxman, Jeremy Pressman
wiley   +1 more source

Guía de ataques, vulnerabilidades, técnicas y herramientas para aplicaciones Web

open access: yesReCIBE, 2015
En la actualidad el riesgo para los sistemas informáticos ha aumentado debido a un crecimiento en la complejidad en las tecnologías de la información. Hoy en día cualquier computadora conectada a internet está expuesta a diversas amenazas.
Ana Laura Hernández Saucedo   +1 more
doaj  

Home - About - Disclaimer - Privacy