Security Presentation Pick a computer threat from the following list: · Virus · Worm · Trojan Horses · Rootkits · Keyloggers · Phishing · Spear
The research proposal is intended to guide the practice during the investigation of a phenomenon related to the practice center where it is located, or
The research proposal is intended to guide the practice during the investigation of a phenomenon related to the practice center where it is located, or topics related to field practice. Will have the opportunity to develop a careful research plan during a reflective, critical, and feasible process toward a goal.