Results 61 to 70 of about 340,149 (262)

Diseño del sistema de gestión de seguridad de la información para el Grupo Empresarial La Ofrenda [PDF]

open access: yes, 2013
El número de atacantes de las redes y de los sistemas en las organizaciones es cada vez mayor, frente a esta situación, un 46% de usuarios afirmó haber recibido un mensaje fraudulento que afirmaba provenir de servicios de correo electrónico como Yahoo ...
Aguirre Cardona, Juan David   +1 more
core  

Landowners Meet Drug Traffickers: Coercive Networks and Violence in Rural Colombia

open access: yesAntipode, Volume 57, Issue 4, Page 1402-1425, July 2025.
Abstract The transport of drugs and the flow of drug proceeds have a major impact on the social and economic configuration of the rural areas affected by them. Though this is widely acknowledged, the impact of illicit economies on agrarian social conflicts remains unclear. Using the case of the marijuana trade in the agrarian societies of the Magdalena
Luis David Castillo Rojas   +1 more
wiley   +1 more source

Ataques à Escola Pública

open access: yesRevista Interdisciplinar em Cultura e Sociedade, 2022
O artigo, sob a perspectiva interdisciplinar, considera a educação como fenômeno social em sua relação com a economia política, processos históricos e pedagógicos. O texto objetiva problematizar as implicações da Escola da Escolha como socialização de indivíduos por meio da Terceira Via como suposta saída à crise do capitalismo atual.
MARIA FABIANA DA SILVA COSTA   +2 more
openaire   +1 more source

Mecanismo para evitar ataques por confabulación basados en code passing [PDF]

open access: yes, 2009
Los agentes móviles son entidades software formadas por código, datos, itinerario y estado, que pueden migrar de host en host autónomamente ejecutando su código. A pesar de sus ventajas, los aspectos de seguridad restringen enormemente el uso de código
Jámiez Moruno, Marc
core   +1 more source

Secure neighbor discovery in wireless sensor networks using range-free localization techniques [PDF]

open access: yes, 2012
Si una red inalámbrica de sensores se implementa en un entorno hostil, las limitaciones intrínsecas a los nodos conllevan muchos problemas de seguridad. En este artículo se aborda un ataque particular a los protocolos de localización y descubrimiento de ...
Adrián Población-Hernández   +8 more
core   +3 more sources

Experimental Determination of Labidus coecus Army Ant Diet: Novel Evidence for a Feeding Strategy

open access: yesBiotropica, Volume 57, Issue 4, July 2025.
Labidus coecus coffee shop experiment – faced with three choices—beef, fish, and apple with honey—the ants mainly chose beef. ABSTRACT Army ants prey mainly on invertebrates, occasionally attacking vertebrates. However, it remains unclear whether these attacks are defensive or for consumption.
Raquel Leite Castro de Lima   +4 more
wiley   +1 more source

Desarrollo de un sistema de seguridad para un juez de maratones de programación tipo ACM-ICPC, que soporte un conjunto de ataques previamente delimitados [PDF]

open access: yes, 2013
Las maratones de programación son eventos que en los últimos años han tenido gran impacto dentro del campo de las ciencias de la computación, tomando cada vez mas importancia entre estudiantes y profesionales debido a que son competencias que ...
Jiménez Becerra, Jhon Bernardo   +1 more
core  

Endogenous rhythmic growth and ectomycorrhizal fungi modulate priming of antiherbivore defences in subsequently formed new leaves of oak trees

open access: yesJournal of Ecology, Volume 113, Issue 6, Page 1382-1396, June 2025.
A first herbivore attack primes direct and indirect defences of newly formed oak leaves and, the specific display of defence priming is regulated by rhythmic growth, and modulated by the interaction with the ectomycorrhizal fungus Piloderma croceum. Therefore, the priming memory in oaks can be transmitted to the next growth cycle. GC, growth cycle; SF,
I. Fernández   +8 more
wiley   +1 more source

Aging with HIV/AIDS in Sub‐Saharan Africa: A scoping review

open access: yesCanadian Geographer / Le géographe canadien, Volume 69, Issue 3, Autumn / automne 2025.
Abstract Older adults in Sub‐Saharan Africa (SSA) are projected to increase 4‐fold from 46 million to 165 million by 2050. Despite this fact, global health policies and programs typically neglect this particular demographic. This is illustrated by the fact that policies and programs directed towards human immunodeficiency virus/acquired ...
Satveer Dhillon   +2 more
wiley   +1 more source

The Social Engineering framework para el aseguramiento de PYME [PDF]

open access: yes, 2016
El trabajo plantea un aporte al framework de ingeniería social (The Social Engineering Framework) para la evaluación del riesgo y mitigación de distintos vectores de ataque, por medio del análisis de árboles de ataque -- Adicionalmente se muestra una ...
Correa Sierra, Alejandro   +1 more
core  

Home - About - Disclaimer - Privacy