Recomendations
More information, which may be usefull to you, may be found after login at it-portal.sk
|
serves to assess the level of security by simulating situations that would be used by an attacker
is an attack on a web server by which the attacker overwhelms the server with a large number of requests from different places and thus blocks it.
show all
Before installing, carefully consider whether you really need the application in question, or whether you were just driven by curiosity or convinced by advertising. Remov... viac...
Source: KCCKB
small or medium-sized companies are not targets for hacker attacks
Source: it-portal.sk
show all
Vyhláška Ministerstva vnútra Slovenskej republiky, ktorou sa mení a dopĺňa vyhláška Ministerstva vnútra Slovenskej republiky č. 94/2004 Z. z., ktorou sa ustanovujú techni... viac...
show link
Vyhláška Národného bezpečnostného úradu, ktorou sa ustanovujú podrobnosti o administratívnej bezpečnosti utajovaných skutočností show link
show all
Information technology — Security techniques — Guidelines for the assessment of information security controls
Source: ISO
Information technology — Security techniques — Requirements for bodies providing audit and certification of information security management systems — Amendment 1
Source: ISO
show all
Explore innovation, meet industry giants and unlock opportunities – at the world’s largest and most influential connectivity event.
Reasons to be at MWC Barcel... viac...
show link
 Certifications
|
0 |
 Acreditations
|
0 |
Contact us by e-mail
|