Technologies
nástroj na evidenciu štrukturovaných informácií... show link
|
|
|
|
is a space that is intended for the continuous operation of computer servers, systems and data storage.
is an international standard, a risk-based standard. It defines the requirements for the establishment, implementation, maintenance and continuous improvement of an infor... viac...
show all
Turn off geolocation tracking in all applications that do not need it for their functionality.
Source: KCCKB
One of the techniques of social engineering is the effort to induce a time crunch. Do not respond to such messages.
Source: KCCKB
show all
Vyhláška Ministerstva vnútra Slovenskej republiky, ktorou sa mení a dopĺňa vyhláška Ministerstva vnútra Slovenskej republiky č. 94/2004 Z. z., ktorou sa ustanovujú techni... viac...
show link
Zákon o kybernetickej bezpečnosti a o zmene a doplnení niektorých zákonov show link
show all
Information technology — Security techniques — Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors
viac...
Source: ISO
Information technology — Security techniques — Code of practice for Information security controls based on ISO/IEC 27002 for telecommunications organizations
Source: ISO
show all
To ale neznamená, že sú jediné
Source: Uptime Institute
To ale neznamená, že sú jediné
Source: Google Maps
show all
Explore innovation, meet industry giants and unlock opportunities – at the world’s largest and most influential connectivity event.
Reasons to be at MWC Barcel... viac...
show link
 Certifications
|
0 |
 Acreditations
|
0 |
Contact us by e-mail
|