- Documentvulnerabilidaduploaded by
Willian Yanza
- Documentanalisis de vulnerabilidadesuploaded by
Willian Yanza
- DocumentCiber Ataques en La Actualidaduploaded by
Willian Yanza
- DocumentCiber Ataque Isacauploaded by
Willian Yanza
- DocumentLas Redes Socialesuploaded by
Willian Yanza
- DocumentRedes Sociales Documentouploaded by
Willian Yanza
- DocumentINFORMACION EN LAS ORGANIZACIONESuploaded by
Willian Yanza
- Documenttema4.pdfuploaded by
Willian Yanza
- Documentipsecuploaded by
Willian Yanza
- Documenttema5.pdfuploaded by
Willian Yanza
- Documenttema3.pdfuploaded by
Willian Yanza
- Documenttema3.pdfuploaded by
Willian Yanza
- Documenttema4.pdfuploaded by
Willian Yanza
- Documentdispositivos de almacenamientouploaded by
Willian Yanza
- Documentanalisis de vulnerabilidadesuploaded by
Willian Yanza
- DocumentSEGURIDAD DE LA INFORMACIONuploaded by
Willian Yanza
- Documenttema1.pdfuploaded by
Willian Yanza
- Documentseguridaduploaded by
Willian Yanza
- Documentwindowsuploaded by
Willian Yanza
- Documentevidenciasuploaded by
Willian Yanza
- Documenttema1.pdfuploaded by
Willian Yanza
- DocumentAnalysis of Windows Authentication.pdfuploaded by
Willian Yanza
- DocumentANALISIS DE AUTENTICACIONuploaded by
Willian Yanza
- Documentguia de administracion de sistemas para seguridad.pdfuploaded by
Willian Yanza
- Documentguia de administracion de sistemas.pdfuploaded by
Willian Yanza
- Documentguia de administracion de sistemas.pdfuploaded by
Willian Yanza
- DocumentGuia de Administracion de Sistemasuploaded by
Willian Yanza
- Documentseguridad informaticauploaded by
Willian Yanza
- DocumentT9ANormas de Control Interno Contraloría General del Estado.pdfuploaded by
Willian Yanza
- Documentmodelo para realizar un articulo cientifico.docxuploaded by
Willian Yanza
- DocumentLectura creativa C15509.docxuploaded by
Willian Yanza
- DocumentLectura creativa C15509uploaded by
Willian Yanza
- DocumentLectura creativa C15509uploaded by
Willian Yanza
- DocumentArticulo a Presentar Octubre Marzouploaded by
Willian Yanza
- Documentpaper Trabajo Completo v3uploaded by
Willian Yanza
- DocumentTAREA 1 Domingo 10 de Marzo 2019uploaded by
Willian Yanza
- DocumentM_AuditoriadeSistemas.pdfuploaded by
Willian Yanza
- DocumentMÓDULO FORMATIVO AUDITORÍA DE SISTEMAS feb sep 2014.docxuploaded by
Willian Yanza
- DocumentM_AuditoriadeSistemas.pdfuploaded by
Willian Yanza
- DocumentT12ACuestionarioAuditoria8cv6.pdfuploaded by
Willian Yanza
- DocumentT1Apuntes.pdfuploaded by
Willian Yanza
- Document4.4 La Seguridad Lógica en La Informáticauploaded by
Willian Yanza
- Document4.3 Informatica Forense 2018uploaded by
Willian Yanza
- Document1.1 Conceptos Basicos y Deficionesuploaded by
Willian Yanza
- DocumentInforme 2 Evaluacion Funcion de Control Evaluacion y Staffuploaded by
Willian Yanza
- DocumentIntroduccion_Sistema de Informacion de La Empresauploaded by
Willian Yanza
- Document1. Introduccion a La IOuploaded by
Willian Yanza
- Documentauditoria forense tecnologicauploaded by
Willian Yanza
- Document2. 1Base de Datos en Accessuploaded by
Willian Yanza