The increase in computer attacks is in increasing demand, nowadays cybercrime to which our data is exposed is more frequent. On the other hand, the management of software and tools used in computer science is what represents today a fundamental pillar in what teaching and scientific research refers, however, the concept goes far beyond that, of the hand of computer security that involves many more factors than are believed, not only physical but logical, referring to all the applications that run on each of the computers and that are part of the software. This paper presents a secure software model based on the software development life cycle and aims to create professionals capable of developing secure software products and at the same tim...
Upon the basis of some limitations dealing with the accomplishment of the security objective, in thi...
Nowadays the organizations know that the computational security in logical, physical, environment se...
Además de realizar una labor determinada de forma eficiente, los servicios informáticos deben ser c...
Secure Software Development is a high importance matter in all companies, because most of them are h...
Resumen: La seguridad ha pasado de ser un requerimiento no funcional, que podía implementarse como p...
La Ciberseguridad es un bien a proteger dado su impacto a nivel político, social, económico e indivi...
Today there are many tools to protect computers and corporate computer networks from attacks, these ...
En la actualidad, la implementación de medios técnicos y tecnológicos ha obligado a la población mun...
Today, due to the development and advancement of technology, software products are part of our daily...
This paper presents the dimentions that defines the Information Security essentials from the authors...
Para desarrollar una aplicación on line que incluya un esquema de seguridad informática, debe aplica...
With the implementation of new trends and the impact of digitization, mass data storage represents a...
[ES]Los desarrolladores de aplicaciones habitualmente desarrollan aplicaciones que se ajusten a los ...
Secure software development is a high importance matter in all companies, because most of them are h...
En la actualidad, existen varios factores que afectan en gran medida la seguridad informática de las...
Upon the basis of some limitations dealing with the accomplishment of the security objective, in thi...
Nowadays the organizations know that the computational security in logical, physical, environment se...
Además de realizar una labor determinada de forma eficiente, los servicios informáticos deben ser c...
Secure Software Development is a high importance matter in all companies, because most of them are h...
Resumen: La seguridad ha pasado de ser un requerimiento no funcional, que podía implementarse como p...
La Ciberseguridad es un bien a proteger dado su impacto a nivel político, social, económico e indivi...
Today there are many tools to protect computers and corporate computer networks from attacks, these ...
En la actualidad, la implementación de medios técnicos y tecnológicos ha obligado a la población mun...
Today, due to the development and advancement of technology, software products are part of our daily...
This paper presents the dimentions that defines the Information Security essentials from the authors...
Para desarrollar una aplicación on line que incluya un esquema de seguridad informática, debe aplica...
With the implementation of new trends and the impact of digitization, mass data storage represents a...
[ES]Los desarrolladores de aplicaciones habitualmente desarrollan aplicaciones que se ajusten a los ...
Secure software development is a high importance matter in all companies, because most of them are h...
En la actualidad, existen varios factores que afectan en gran medida la seguridad informática de las...
Upon the basis of some limitations dealing with the accomplishment of the security objective, in thi...
Nowadays the organizations know that the computational security in logical, physical, environment se...
Además de realizar una labor determinada de forma eficiente, los servicios informáticos deben ser c...