Blue Team Village - Security Strategy for Small - Medium Business
This is a modal window.
The media could not be loaded, either because the server or network failed or because the format is not supported.
Formal Metadata
Title |
| |
Title of Series | ||
Number of Parts | 335 | |
Author | ||
License | CC Attribution 3.0 Unported: You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal purpose as long as the work is attributed to the author in the manner specified by the author or licensor. | |
Identifiers | 10.5446/48587 (DOI) | |
Publisher | ||
Release Date | ||
Language |
Content Metadata
Subject Area | ||
Genre | ||
Abstract |
|
DEF CON 27148 / 335
8
9
12
14
32
38
41
58
60
61
72
75
83
87
92
96
108
115
128
132
143
152
158
159
191
193
218
230
268
271
273
276
278
295
310
320
321
335
04:10
Programmable read-only memoryMenu (computing)
06:04
Menu (computing)Computer-generated imagerySine
11:20
Information securityCubeSelf-organizationChief information officer
14:47
Formal languageDesign by contractInformation security
17:20
SoftwareIntegrated development environmentArchitectureInformation security
23:05
Link (knot theory)Endliche ModelltheorieInformation securityProcess capability indexHacker (term)
28:15
Endliche Modelltheorie
30:34
Link (knot theory)