Résultat de la recherche
1 recherche sur le mot-clé
'Vulnerability Management' ![Ne pas surligner les mots recherchés Ne pas surligner les mots recherchés](./images/text_horizontalrule.png)
![Imprimer la page de recherche courante...](./images/print.gif)
![Tris disponibles](./images/orderby_az.gif)
![]()
Article : Articles
AD McKINNON, Auteur |You cannot protect what you do not know you have. The first rule of cybersecurity is knowing what you have to better protect it. This paper presents an innovative remote inventory pilot for U.S. Army Reserve (USAR) sites’ Facility-Related Cont[...]
Article en page(s) : 21p. Tags : Augmented Reality ; Cybersecurity ; Vulnerability Management ; Sensor Deployment Langues: Anglais