Media
 |
41. Hacking a kybernetická bezpečnost - Hydra a prolamování hesel - formulář v HTML, tvorba příkazu
Source: David Šetek - Hackni svou budoucnost
|
|
 Actual incidents
|
6 |
 What is what in IT
|
66 |
is a procedure that determines the probability that an undesirable event will occur and what its consequences will be
is carried out by risk analysis and are included in the Catalog of Vulnerabilities
Source: it.portal
show all
 Interesting
|
22 |
 Recomendations
|
377 |
používam HTTPS, takže moja stránka je bezpečná
Source: it-portal.sk
Implement specific technical and organizational measures.
Source: it.portal
show all
 Institutions
|
51 |
 Legislative
|
82 |
Zákon o kritickej infraštruktúre a o zmene a doplnení niektorých zákonov show link
Source: Slov-Lex
Vyhláška Národného bezpečnostného úradu o personálnej bezpečnosti show link
Source: Slov-Lex
show all
 Norms
|
25 |
Information technology — Security techniques — Code of practice for information security controls based on ISO/IEC 27002 for cloud services
Source: ISO
Information technology — Security techniques — Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors
more...
Source: ISO
show all
 Technologies
|
14 |
 Infographics
|
7 |
To ale neznamená, že sú jediné
Source: Google Maps
show all
 Events
|
0 |
 Certifications
|
0 |
 Acreditations
|
0 |
 Media
|
436 |
Contact us by e-mail
|