Search

The Weak link in IT security

<?xml version="1.0" encoding="UTF-8" standalone="no"?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<rdf:Description>
<dc:creator>Wade, Jared</dc:creator>
<dc:date>2004-07-01</dc:date>
<dc:description xml:lang="es">Increasingly powerful IT applications have become the mainstay of modern business technology. The risk of viruses, unauhorized data access and electronic vandalims, however, all make strong IT a must. Nevertheless, most employees still understand very little about computer viruses, how they work or where they come from</dc:description>
<dc:identifier>https://documentacion.fundacionmapfre.org/documentacion/publico/es/bib/57559.do</dc:identifier>
<dc:language>eng</dc:language>
<dc:rights xml:lang="es">InC - http://rightsstatements.org/vocab/InC/1.0/</dc:rights>
<dc:subject xml:lang="es">Seguridad informática</dc:subject>
<dc:subject xml:lang="es">Nuevas tecnologías</dc:subject>
<dc:subject xml:lang="es">Virus informáticos</dc:subject>
<dc:subject xml:lang="es">Hackers</dc:subject>
<dc:subject xml:lang="es">Empresas</dc:subject>
<dc:type xml:lang="es">Artículos y capítulos</dc:type>
<dc:title xml:lang="es">The Weak link in IT security</dc:title>
<dc:title xml:lang="es">Título: Risk management</dc:title>
<dc:relation xml:lang="es">En: Risk management. - New York. - nº 7, July 2004 ; p. 32-37</dc:relation>
</rdf:Description>
</rdf:RDF>