Gør som tusindvis af andre bogelskere
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.Du kan altid afmelde dig igen.
This book will allow to know the different theoretical references necessary to reach the design and construction of a cybersecurity framework, through the use of free software and emerging technologies. How was the selection of the different antecedents obtained, this was carried out through a search in different bibliographic sources in order to take up the most important and necessary to manage the different risks and threats that can be generated in any context.
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.