banking applications booking systems school management systems regular security audits patch management malicious insiders insider threats social engineering sql injection hacking data breaches vishing (voice phishing) spear phishing email phishing . phishing ransomware trojans worms viruses malware threats data and protection safety and security utilities application software operating system healthcare information syst i/o devices motherboard storage ssd hard drive ram programming cpu communication technologies software and programs computer-based systems physical component main components of computer network-based control broadcast media satellite systems recognition systems expert systems computers in the retail indust computers in medicine cybersecurity digital media software applications internet télécommunications communication technology data management it ict leadership: emotional intelligence: power in project management influence: william ouchy's theory z mcgregor’s theory x and theory y: it project management motivational theories simplifying rules of kmaps kmap and its types kmap
Ver más