Artículos de revistas sobre el tema "Information security"

Siga este enlace para ver otros tipos de publicaciones sobre el tema: Information security.

Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros

Elija tipo de fuente:

Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "Information security".

Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.

También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.

Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.

1

Shumilina, Vera y Alexander Kim. "MODERN INFORMATION SECURITY AND INFORMATION SECURITY". Science & World 2022, n.º 3 (30 de agosto de 2022): 96–100. http://dx.doi.org/10.26526/2307-9401-2022-3-96-100.

Texto completo
Resumen
This article examines the concept of information security, how it is implemented and enforced. It analyses the essence of information, what it is for, what processes are studied with its help. The basic criteria of information security, which guarantee reliable protection for information, are given, and popular and malicious software, which destabilize and destroy the work of the information system, are discussed
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Imai, Hideki. "Information security. 1. Information security and cryptography." Journal of the Institute of Television Engineers of Japan 42, n.º 12 (1988): 1285–90. http://dx.doi.org/10.3169/itej1978.42.1285.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Namba, Seiichi. "Information security. 2. Information security in broadcasting." Journal of the Institute of Television Engineers of Japan 42, n.º 12 (1988): 1291–98. http://dx.doi.org/10.3169/itej1978.42.1291.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Koyama, Kenji. "Information security. 3. Information security for communications." Journal of the Institute of Television Engineers of Japan 42, n.º 12 (1988): 1299–306. http://dx.doi.org/10.3169/itej1978.42.1299.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Matsumoto, Tsutomu. "Information security. 4. Information security in network." Journal of the Institute of Television Engineers of Japan 42, n.º 12 (1988): 1307–13. http://dx.doi.org/10.3169/itej1978.42.1307.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Humaidi, Norshima y Vimala Balakrishnan. "Leadership Styles and Information Security Compliance Behavior: The Mediator Effect of Information Security Awareness". International Journal of Information and Education Technology 5, n.º 4 (2015): 311–18. http://dx.doi.org/10.7763/ijiet.2015.v5.522.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Adambaevich, Khabibullaev Hikmat. "ISSUES OF ENSURING INFORMATION SECURITY IN INFORMATION FACILITIES". European International Journal of Multidisciplinary Research and Management Studies 02, n.º 10 (11 de octubre de 2022): 281–83. http://dx.doi.org/10.55640/eijmrms-02-10-52.

Texto completo
Resumen
In the process of globalization, that is, in today's information age, the issue of ensuring information security is gaining priority. Today, the issue of ensuring information security is becoming very important and urgent not only in the Internet network or any information system, but also in information facilities. In this article, the issues of ensuring information security in information facilities are considered on the example of safe storage of rare books in information-library institutions, and relevant suggestions and recommendations are developed.
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Erceg, Aleksandar. "Information security". Tehnički glasnik 13, n.º 2 (17 de junio de 2019): 123–28. http://dx.doi.org/10.31803/tg-20180717222848.

Texto completo
Resumen
Information security inside the organization is becoming a major issue in the modern and global world. Information accessibility and security are a major issue where user behaviour plays an important role. Information security user behaviour is becoming an increasing threat to their organization information security. Since the organization is investing in and implementing information security systems, the issue of employees’ behaviour has become increasingly important. This paper aims to show how workers treat information security and is looking upon so called “people problem”. In the research, the personal behaviour of health care professionals and workers in a Croatian production company in relation to information security was tested. Results have shown that the overall behaviour of respondents in production company is more responsible and security awareness with proper use of passwords is associated with knowledge about the importance of security application in their work. Further research is recommended.
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Kaushik, Saurav. "Information Security". International Journal for Research in Applied Science and Engineering Technology 8, n.º 5 (31 de mayo de 2020): 2779–83. http://dx.doi.org/10.22214/ijraset.2020.5468.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Yamamoto, Akitomo. "Information Security". IEEJ Transactions on Electronics, Information and Systems 107, n.º 9 (1987): 804–9. http://dx.doi.org/10.1541/ieejeiss1987.107.9_804.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
11

Jesan, John Peter. "Information security". Ubiquity 2006, January (enero de 2006): 2. http://dx.doi.org/10.1145/1119621.1117695.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
12

Silic, Mario y Andrea Back. "Information security". Information Management & Computer Security 22, n.º 3 (8 de julio de 2014): 279–308. http://dx.doi.org/10.1108/imcs-05-2013-0041.

Texto completo
Resumen
Purpose – The purpose of this literature review is to analyze current trends in information security and suggest future directions for research. Design/methodology/approach – The authors used literature review to analyze 1,588 papers from 23 journals and 5 conferences. Findings – The authors identified 164 different theories used in 684 publications. Distribution of research methods showed that the subjective-argumentative category accounted for 81 per cent, whereas other methods got very low focus. This research offers implications for future research directions on information security. They also identified existing knowledge gaps and how the existing themes are studied in academia. Research limitations/implications – The literature review did not include some dedicated security journals (i.e. Cryptography). Practical implications – The study reveals future directions and trend that the academia should consider. Originality/value – Information security is top concern for organizations, and this research analyzed how academia dealt with the topic since 1977. Also, the authors suggest future directions for research suggesting new research streams.
Los estilos APA, Harvard, Vancouver, ISO, etc.
13

Laybats, Claire y Luke Tredinnick. "Information security". Business Information Review 33, n.º 2 (junio de 2016): 76–80. http://dx.doi.org/10.1177/0266382116653061.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
14

Yang, Xia. "A Novel Information Security Model for Securing Information Systems". Applied Mechanics and Materials 685 (octubre de 2014): 493–96. http://dx.doi.org/10.4028/www.scientific.net/amm.685.493.

Texto completo
Resumen
Securing information system in current information era is very important task. This paper presents a novel security model in order to secure sensitive information systems. This model combines protection, detection, recovery and control mechanisms to secure information system in their development lifecycle, which is more effective than the traditional ones.
Los estilos APA, Harvard, Vancouver, ISO, etc.
15

Sharma, Suman, Yogesh Verma y Amit Nadda. "Information Security Cyber Security Challenges". International Journal of Scientific Research in Computer Science and Engineering 7, n.º 1 (28 de febrero de 2019): 10–15. http://dx.doi.org/10.26438/ijsrcse/v7i1.1015.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
16

Dunkerley, Kimberley y Gurvirender Tejay. "Theorizing Information Security Success". International Journal of Electronic Government Research 6, n.º 3 (julio de 2010): 31–41. http://dx.doi.org/10.4018/jegr.2010070103.

Texto completo
Resumen
As information systems become more pervasive within organizations, securing their associated information assets has become a topic of extensive research. However, minimal research has been focused on understanding the dimensions of information systems security within an organizational context. This study organizes a considerable body of information systems security literature based on their findings, and the authors identify core dimensions of information system security success and operationalize them as a model to predict success with information security initiatives. The utility of the proposed model is evaluated for the e-Government context and emergent issues for research and practice are discussed.
Los estilos APA, Harvard, Vancouver, ISO, etc.
17

Wendzel, Steffen, Luca Caviglione, Alessandro Checco, Aleksandra Mileva, Jean-Francois Lalande y Wojciech Mazurczyk. "Information Security Methodology, Replication Studies and Information Security Education". JUCS - Journal of Universal Computer Science 26, n.º 7 (28 de julio de 2020): 762–63. http://dx.doi.org/10.3897/jucs.2020.041.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
18

Singh, Lisha, Sahil Sharma y Sneh Rathore. "Secure101: Automatic Surveillance and Information Security". International Journal of Trend in Scientific Research and Development Volume-2, Issue-3 (30 de abril de 2018): 1527–32. http://dx.doi.org/10.31142/ijtsrd11298.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
19

Domozetov, Christo. "Information Security: Management and Personnel Issues". Information & Security: An International Journal 1, n.º 1 (1998): 46–60. http://dx.doi.org/10.11610/isij.0104.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
20

Kavaljiev, Todor. "Information in providing security and prosperity". Information & Security: An International Journal 1, n.º 2 (1998): 11–13. http://dx.doi.org/10.11610/isij.0112.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
21

Tagarev, Peter. "National Security Concepts and Information Warfare". Information & Security: An International Journal 1, n.º 2 (1998): 33–42. http://dx.doi.org/10.11610/isij.0114.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
22

Samijonov, Nurmukhammad Y. "AI FOR INFORMATION SECURITY AND CYBERSPACE". American Journal of Applied Science and Technology 3, n.º 10 (1 de octubre de 2023): 39–43. http://dx.doi.org/10.37547/ajast/volume03issue10-08.

Texto completo
Resumen
Taking into account the fact that artificial intelligence can expand the capabilities of humanity, accelerate the speed of data analysis several times, and help people reach correct and accurate conclusions in the decision-making process, it can improve data security or, on the contrary, target propaganda and fake news. Collecting information, taking very little responsibility, and taking into account the fact that social networks can expand the speed and extent of dissemination of information simultaneously in two opposite directions, AI can both strengthen cyber security or create new types of threats to it.
Los estilos APA, Harvard, Vancouver, ISO, etc.
23

Lestari, Dwi Puji. "Factors Affecting Security Information Systems : Information Security, Threats and Cyber Attack, Physical Security, and Information Technology". IJIIS: International Journal of Informatics and Information Systems 7, n.º 1 (7 de enero de 2024): 16–21. http://dx.doi.org/10.47738/ijiis.v7i1.193.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
24

Morita, Hikaru y Shoji Miyaguchi. "Special Edition. Recent Information Security. Essential Security Technologies. Recent Trends of Information Security." Journal of the Institute of Television Engineers of Japan 47, n.º 2 (1993): 138–40. http://dx.doi.org/10.3169/itej1978.47.138.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
25

Bondar, H. L. y L. O. Rakutina. "Information policy and information security". Public administration and customs administration 4 (2019): 42–49. http://dx.doi.org/10.32836/2310-9653-2019-4-42-49.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
26

LIDERMAN, Krzysztof y Andrzej MALIK. "INFORMATION POLICY AND INFORMATION SECURITY". National Security Studies 4, n.º 1 (1 de diciembre de 2013): 399–411. http://dx.doi.org/10.37055/sbn/129814.

Texto completo
Resumen
W artykule została przedstawiona problematyka polityki informacyjnej, przede wszystkim w odniesieniu do polityki informacyjnej resortu Obrony Narodowej, ograniczonej specyficznie do treści zamieszczanych w Internecie. Wskazano na możliwości osiągania różnych celów propagandowych poprzez umiejętne manipulowanie atrybutami informacji (rozdz. 2 i 3) oraz na możliwości wykorzystania Internetu w zakresie kształtowania świadomości jego użytkowników (rozdz. 4).
Los estilos APA, Harvard, Vancouver, ISO, etc.
27

Hojda, Mihaela Hortensia. "Information security economics: cyber security threats". Proceedings of the International Conference on Business Excellence 16, n.º 1 (1 de agosto de 2022): 584–92. http://dx.doi.org/10.2478/picbe-2022-0056.

Texto completo
Resumen
Abstract This article takes into consideration cyber security economics to understand whether cyber security and economics is a partnership among equals or any of these two disciplines have the upper hand. Cyber security economics is more than just computer science, security studies and economics in a holistic way, it is a dynamic cross disciplinary matter involving psychology, forensic, sociology, etc. The argument is that there is no clear definition of cybersecurity, apart from a set of protocols that are highly technical, and when it comes to cyber security economics Gordon-Loeb model provides a good picture on the general image over the industry, yet, much more is ignored, as the costs of a cyber security attack to succeed is huge, save the hidden costs and other externalities. Apart from regulation establishing a common ground, information security economics is an under researched field of interest, especially as digital sovereignty act is about to be voted for, together with common rules Information security.
Los estilos APA, Harvard, Vancouver, ISO, etc.
28

Kuka, Elda y Rovena Bahiti. "Information Security Management: Password Security Issues". Academic Journal of Interdisciplinary Studies 7, n.º 2 (1 de julio de 2018): 43–47. http://dx.doi.org/10.2478/ajis-2018-0045.

Texto completo
Resumen
Abstract As users of technology in our everyday actions we need to authenticate in different applications, in fast and secure mode. Although passwords are called the least secure mode of authentication, it’s the simplicity of entering a textual password for just a few seconds, especially when a fast transaction is needed, the main advantage that textual password based authentication method has against other authentication methods. We have prepared a questionnaire that will help us to identify the practices, characteristics, and problems of creation and usage of passwords in online applications, services and social networks. The target population is a group of users who have knowledge on information technology in public administration.
Los estilos APA, Harvard, Vancouver, ISO, etc.
29

Johnston, Allen C. y Ron Hale. "Improved security through information security governance". Communications of the ACM 52, n.º 1 (enero de 2009): 126–29. http://dx.doi.org/10.1145/1435417.1435446.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
30

von Solms, Basie y Rossouw von Solms. "From information security to…business security?" Computers & Security 24, n.º 4 (junio de 2005): 271–73. http://dx.doi.org/10.1016/j.cose.2005.04.004.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
31

von Solms, Rossouw y Johan van Niekerk. "From information security to cyber security". Computers & Security 38 (octubre de 2013): 97–102. http://dx.doi.org/10.1016/j.cose.2013.04.004.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
32

Martins, José, Henrique dos Santos, António Rosinha y Agostinho Valente. "Information Security Management". International Journal of Cyber Warfare and Terrorism 3, n.º 3 (julio de 2013): 32–48. http://dx.doi.org/10.4018/ijcwt.2013070103.

Texto completo
Resumen
The authors present a Case Study conducted in a Portuguese military organization, to answer the following research questions: (1) what are the most relevant dimensions and categories of information security controls applied in military organizations? (2) What are the main scenarios of information security incidents that are expected to occur? (3) What is the decision process used for planning and selection information security controls? This study reveals that: (1) information security within the military organization is built on the basis of physical and human attack vectors, and targeting the infrastructure that supports the flow of information in the organization; (2) the information security controls applied in the military organization are included in ISO/IEC 27001; (3) planning and selection of applied information security controls are made by decision makers and information security specialists. It appears that specialists impose their planning options essentially seeking to select and retrieve past successful information security cases.
Los estilos APA, Harvard, Vancouver, ISO, etc.
33

Lim, Joo S., Sean B. Maynard, Atif Ahmad y Shanton Chang. "Information Security Culture". International Journal of Cyber Warfare and Terrorism 5, n.º 2 (abril de 2015): 31–52. http://dx.doi.org/10.4018/ijcwt.2015040103.

Texto completo
Resumen
There is considerable literature in the area of information security management (ISM). However, from an organizational viewpoint, the collective body of literature does not present a coherent, unified view of recommended security management practices. In particular, despite the existence of ‘best-practice' standards on information security management, organizations have no way of evaluating the reliability or objectivity of the recommended practices as they do not provide any underlying reasoning or justification. This paper is a first step towards the development of rigorous and formal instruments of measurement by which organizations can assess their security management practices. The paper identifies nine security practice constructs from the literature and develops measurement items for organizations to assess the adequacy of their security management practices. The study uses a multiple case study approach followed by interviews with a panel of four security experts to validate and refine these security practice constructs and their associated measures.
Los estilos APA, Harvard, Vancouver, ISO, etc.
34

Somepalli, Sri Harsha, Sai Kishore Reddy Tangella y Santosh Yalamanchili. "Information Security Management". HOLISTICA – Journal of Business and Public Administration 11, n.º 2 (1 de agosto de 2020): 1–16. http://dx.doi.org/10.2478/hjbpa-2020-0015.

Texto completo
Resumen
AbstractInformation security management is a very important issue for anyone working in the field of technology, or for anyone at risk of security breach, who understands the implications of these vulnerabilities. Many organizations are always on the constant threat of a security breach. It is easy for an organization to experience a data breach that can seriously compromise their data. With the evolving threats of data security, organizations are always working to ensure that their data is protected. Frameworks associated with information security can be pivotal to an organization. Frameworks employed in organizations helps to protect the employee and user information which is essential as it puts employees and clients at ease that their information is secure. Identifying the ideal frameworks for an organization is important. However, this process can be a bit tricky as a lot has to be considered to identify the best framework for the organization.
Los estilos APA, Harvard, Vancouver, ISO, etc.
35

Liang, Yingbin, H. Vincent Poor y Shlomo Shamai (Shitz). "Information Theoretic Security". Foundations and Trends® in Communications and Information Theory 5, n.º 4–5 (2007): 355–580. http://dx.doi.org/10.1561/0100000036.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
36

Boychenko, O. V. y D. V. Ivanyuta. "INFORMATION SECURITY MODELS". Construction economic and environmental management 80, n.º 3 (2022): 33–39. http://dx.doi.org/10.37279/2519-4453-2021-3-33-39.

Texto completo
Resumen
This article considers the problem of ensuring information security in modern conditions. The analysis of a possible solution to this problem is carried out by constructing information security models: conceptual, mathematical and functional. Taking into account the improvement of strategic information security management and new technologies in the computer sphere, an attempt is made to consider in detail the conceptual model of information security, the importance and necessity of which is associated with an increase in the volume of transmitted, used and stored data, as well as the implementation in practice of protecting the information rights of users using the proposed mechanisms.
Los estilos APA, Harvard, Vancouver, ISO, etc.
37

Wu, Yu ’Andy’ y Carol Stoak Saunders. "Governing Information Security". Information Resources Management Journal 24, n.º 1 (enero de 2011): 28–45. http://dx.doi.org/10.4018/irmj.2011010103.

Texto completo
Resumen
Governance of the information security function is critical to effective security. In this paper, the authors present a conceptual model for security governance from the perspective of decision rights allocation. Based on Da Veiga and Eloff’s (2007) framework for security governance and two high-level information security documents published by the National Institute of Standards and Technology (NIST), the authors present seven domains of information security governance. For each of the governance domains, they propose a main decision type, using the taxonomy of information technology decisions defined by Weill and Ross (2004). This framework recommends the selection of decision rights allocation patterns that are proper to those decision types to ensure good security decisions. As a result, a balance can be achieved between decisional authority and responsibility for information security.
Los estilos APA, Harvard, Vancouver, ISO, etc.
38

Knapp, Kenneth J., Thomas E. Marshall, R. Kelly Rainer Jr. y F. Nelson Ford. "Information Security Effectiveness". International Journal of Information Security and Privacy 1, n.º 2 (abril de 2007): 37–60. http://dx.doi.org/10.4018/jisp.2007040103.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
39

Jahankhani, Hamid, Shantha Fernando, Mathews Z. Nkhoma y Haralambos Mouratidis. "Information Systems Security". International Journal of Information Security and Privacy 1, n.º 3 (julio de 2007): 13–25. http://dx.doi.org/10.4018/jisp.2007070102.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
40

Лихачева y G. Likhacheva. "Information technology security". Safety in Technosphere 1, n.º 6 (25 de diciembre de 2012): 70–73. http://dx.doi.org/10.12737/162.

Texto completo
Resumen
Security issues of individual and society from new types of threats created by Internet information systems and technologies are considered in this article. Globalization has created conditions for emergence of information weapon that has generated not only information wars, but also evolutionary confrontations — creation of planetary system of mankind monitoring and management that will lead the mankind to the involution. Fight has moved to intellectual space. Security is provided with knowledge of main sleights and technologies of information weapon, means of its recognition, and protection methods against it. Knowledge of universe laws provides the evolutionary development of mankind.
Los estilos APA, Harvard, Vancouver, ISO, etc.
41

Dotson, Daniel S. "Information Security Resources". Science & Technology Libraries 27, n.º 3 (10 de julio de 2007): 29–51. http://dx.doi.org/10.1300/j122v27n03_03.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
42

Gifford, E. A. "Electronic information security". IEEE Potentials 7, n.º 4 (diciembre de 1988): 26–30. http://dx.doi.org/10.1109/45.31568.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
43

Fried, Louis. "DISTRIBUTED INFORMATION SECURITY". Information Systems Management 10, n.º 3 (enero de 1993): 56–65. http://dx.doi.org/10.1080/10580539308906944.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
44

Tsujii, Shigeo. "On Information Security". IEEJ Transactions on Electronics, Information and Systems 107, n.º 9 (1987): 792–97. http://dx.doi.org/10.1541/ieejeiss1987.107.9_792.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
45

Poore, Ralph Spencer. "Information Security Governance". EDPACS 33, n.º 5 (noviembre de 2005): 1–8. http://dx.doi.org/10.1201/1079.07366981/45653.33.5.20051101/91005.1.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
46

Tipton, Harold y Micki Krause. "Information Security Management". EDPACS 27, n.º 12 (junio de 2000): 1. http://dx.doi.org/10.1201/1079/43258.27.12.20000601/30344.4.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
47

Fitzgerald, Kevin J. "Information security baselines". Information Management & Computer Security 3, n.º 2 (mayo de 1995): 8–12. http://dx.doi.org/10.1108/09685229510088575.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
48

Williams, Paul. "Information Security Governance". Information Security Technical Report 6, n.º 3 (septiembre de 2001): 60–70. http://dx.doi.org/10.1016/s1363-4127(01)00309-0.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
49

Eloff, J. H. P. y M. M. Eloff. "Information security architecture". Computer Fraud & Security 2005, n.º 11 (noviembre de 2005): 10–16. http://dx.doi.org/10.1016/s1361-3723(05)70275-x.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
50

Lundgren, Björn y Niklas Möller. "Defining Information Security". Science and Engineering Ethics 25, n.º 2 (15 de noviembre de 2017): 419–41. http://dx.doi.org/10.1007/s11948-017-9992-1.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
Ofrecemos descuentos en todos los planes premium para autores cuyas obras están incluidas en selecciones literarias temáticas. ¡Contáctenos para obtener un código promocional único!

Pasar a la bibliografía