Skip to main content
Graph
Search
fr
|
en
Login
Search
All
Categories
Concepts
Courses
Lectures
MOOCs
People
Practice
Publications
Startups
Units
Show all results for
Home
Concept
Data breach
Applied sciences
Computer engineering
Computer security
Information security
Graph Chatbot
Related lectures (31)
Login to filter by course
Login to filter by course
Reset
Previous
Page 3 of 4
Next
Intellectual Property and Data Protection
Explores intellectual property rights, data protection principles, and compliance with data protection laws.
Display Financial Center Tables V2
Covers the display of financial tables for a specific center.
De-anonymization: The Risks of Anonymized Data
Discusses the risks of sharing supposedly anonymous data and the techniques to protect sensitive information.
Protecting Work: Threats
Discusses the importance of protecting work and EPFL through laws, regulations, threat identification, data protection, risk prevention, and security controls.
Unintended Consequences of Technology in Global South
Examines unintended negative impacts of technology in sustainable development, addressing challenges and consequences in the Global South.
Smart Urban Transportation Systems: The Shift Pathway
Explores the shift pathway in smart urban transportation systems, focusing on new mobility services and their integration.
Protecting your data
Emphasizes the importance of data protection, covering threats, risks, prevention, and real-life examples of data loss incidents.
Personal Devices: Security and Privacy
Explores security and privacy issues in personal electronic devices, emphasizing the importance of safeguarding Personally Identifiable Information.
Foundations of ICT: Decision Makers
Covers the foundations of ICT for decision makers, focusing on understanding ICT and digital trust topics.
Physical Side-Channel Attacks: Techniques and Countermeasures
Discusses physical side-channel attacks, their techniques, and countermeasures to protect sensitive information from being compromised.