To secure a website you need to engage in three strategies: prevention (before an attack), detection (during an attack) and…
This material describes some of the most significant new threats to Cybersecurity, with the view to better understand the diverse…
By approaching the concept of security taking into consideration the current reality and a future that does not allow us…
Nowadays mobile ad hoc networks (MANETs) are much more popular and efficient than before. Therefore, the concept of security is…
For all nations, the revolution in the area of information technology has changed the way business and government operate, as…
The primary scope of the principle of layered security is to achieve a multi-level protection on the data in both…
With the growth of commercial activity on the internet, a domain name can be said to be used as a…
The information technology domain advances and at the same time criminals are using new methods to commit cybercrimes. Cyber infrastructures…
To the unconfined aquifero Montes Torozos (Spain). The high vulnerability characteristics and the most dangerous elements were taken under consideration…
This paper continues other scientific research (tefanic and Oprea G., 2010, 2011) aimed to rectify the Waksman and Karunacker method…