Results 21 to 30 of about 319,488 (211)
O presente estudo pretende analisar um contexto particularmente considerado novo no território brasileiro: o school shooting, que em tradução livre pode ser definido como tiros em escola ou ambientes escolares.
Jonatas dos Santos Silva +2 more
doaj +1 more source
Efficient and model‐agnostic parameter estimation under privacy‐preserving post‐randomization data
Abstract Balancing data privacy with public access is critical for sensitive datasets. However, even after de‐identification, the data are still vulnerable to, for example, inference attacks (by matching some keywords with external datasets). Statistical disclosure control (SDC) methods offer additional protection, and the post‐randomization method ...
Qinglong Tian, Jiwei Zhao
wiley +1 more source
Este artigo teórico tem como objetivo discutir a relação entre o novo modelo neoliberal, o conservadorismo e a desdemocratização com a retirada de direitos e os ataques às políticas de gênero. Este novo modelo, que propõe não só uma política econômica, mas também uma racionalidade conservadora e antidemocrática tem como lastros a chamada ideologia de ...
Emanuele Mantovani +1 more
openaire +1 more source
Not All Heroes Wear Capes: Cyber Resilience of the Social Administration at a Swedish Municipality
ABSTRACT This study examines the role of crisis management as an enabling practice for organizational cyber resilience within the public sector. Taking a stakeholder perspective, this qualitative case study analyzes how a Swedish municipal social administration, which was the victim of a ransomware attack that escalated into a crisis, managed to ...
Anton Holmström, Christine Große
wiley +1 more source
Diseño de circuitos integrados y seguridad de circuitos criptográficos frente a ataques [PDF]
Muchos sistemas electrónicos incorporan dispositivos criptográficos que implementan algoritmos que cifran la información almacenada. Pero aun cuando los algoritmos sean muy seguros, estos dispositivos pueden llegar a revelar cierta información debido a ...
Baena Oliva, María del Carmen +6 more
core
The Told Story of the Gaza War
ABSTRACT All violent conflicts and wars involve at least two competing narratives. This is also the case for the conflict commonly referred to as the Gaza War, which began on October 7, 2023, and lasted 471 days until the first phase of the ceasefire was implemented. The war involved, on one side, Israel with substantial support from the United States,
Daniel Bar‐Tal
wiley +1 more source
Una credencial de autenticación es una orden que autoriza el acceso a una red social, correo electrónico u otros sitios web que requieren información personal de un usuario registrado.
Paola Andrea Noreña Cardona +1 more
doaj +1 more source
Diseño del sistema de gestión de seguridad de la información para el Grupo Empresarial La Ofrenda [PDF]
El número de atacantes de las redes y de los sistemas en las organizaciones es cada vez mayor, frente a esta situación, un 46% de usuarios afirmó haber recibido un mensaje fraudulento que afirmaba provenir de servicios de correo electrónico como Yahoo ...
Aguirre Cardona, Juan David +1 more
core
No Limits: The Biden Administration's Support for Israel's War on Gaza
ABSTRACT The war in Gaza that Israel launched in response to the Hamas‐led attack in southern Israel on October 7, 2023, has been the longest and deadliest war in the history of the Israeli‐Palestinian conflict and one of the most lethal and destructive in recent history.
Dov Waxman, Jeremy Pressman
wiley +1 more source
Guía de ataques, vulnerabilidades, técnicas y herramientas para aplicaciones Web
En la actualidad el riesgo para los sistemas informáticos ha aumentado debido a un crecimiento en la complejidad en las tecnologías de la información. Hoy en día cualquier computadora conectada a internet está expuesta a diversas amenazas.
Ana Laura Hernández Saucedo +1 more
doaj

