Skip to main content
Graph
Search
fr
en
Login
Search
All
Categories
Concepts
Courses
Lectures
MOOCs
People
Practice
Publications
Startups
Units
Show all results for
Home
Concept
Vulnerability management
Applied sciences
Computer engineering
Computer security
Information security
Graph Chatbot
Related lectures (32)
Login to filter by course
Login to filter by course
Reset
Previous
Page 4 of 4
Next
Protecting Work: Threats
Discusses the importance of protecting work and EPFL through laws, regulations, threat identification, data protection, risk prevention, and security controls.
Security Principles: Work Factor & Compromise Recording
Explores the work factor and compromise recording principles in computer security, emphasizing cost evaluation and tamper-evident logs.