Tapping into the underground
Contenido multimedia no disponible por derechos de autor o por acceso restringido. Contacte con la institución para más información.
Tag | 1 | 2 | Valor |
---|---|---|---|
LDR | 00000nab a2200000 i 4500 | ||
001 | MAP20071507505 | ||
003 | MAP | ||
005 | 20220912145301.0 | ||
007 | hzruuu---uuuu | ||
008 | 051226e20050621usa|||| | |00010|eng d | ||
040 | $aMAP$bspa | ||
084 | $a82 | ||
100 | 1 | $0MAPA20080109103$aMollick, Ethan | |
245 | 1 | 0 | $aTapping into the underground$cEthan Mollick |
520 | 8 | $aCompanies typically have antagonistic relationships with hackers, and others, who alter their products, but is there a way to work with such underground innovators? Many companies are planning systems to colaborate with those groups, following steps like exploitation, reaction, incorporation, boredom as a new strategy to protect their products | |
650 | 0 | 1 | $0MAPA20080546991$aEmpresas |
650 | 1 | 1 | $0MAPA20080544119$aHackers |
650 | 0 | 1 | $0MAPA20080608460$aSeguridad de productos |
650 | 0 | 1 | $0MAPA20080554866$aInnovación |
650 | 1 | 1 | $0MAPA20080586546$aNuevas tecnologías |
740 | 0 | $aSloan management review | |
773 | 0 | $wMAP20077000185$tSloan management review$dBoulder$gVol. 46, nº 4, Summer 2005 ; p. 21-24 |