書名 | 作者 | 出版年 | 查看 | 回報錯誤連結 |
The law and economics of cybersecurity:edited by Mark F. Grady, Francesco Parisi. |
|
2006 |
查看
|
回報問題連結 |
Hardware security:a hands-on learning approach / |
Swarup Bhunia, Mark Tehranipoor. |
2019 |
查看
|
回報問題連結 |
Research methods for cyber security |
Thomas W. Edgar, David O. Manz. |
2017 |
查看
|
回報問題連結 |
Security controls evaluation, testing, and assessment handbook |
Leighton Johnson. |
2020 |
查看
|
回報問題連結 |
Cybersecurity policy in the EU and South Korea from consultation to action :theoretical and comparative perspectives / |
Gertjan Boulet, Michael Reiterer, Ramon Pacheco Pardo. |
|
查看
|
回報問題連結 |
Cybersecurity and decision makers:data security and digital trust / |
Marie de Fréminville. |
2020 |
查看
|
回報問題連結 |
Cybersecurity research analysis report for Europe and Japan :cybersecurity and privacy dialogue between Europe and Japan / |
Anna Felkner, Youki Kadobayashi, Marek Janiszewski, Stefano Fantin, Jose Francisco Ruiz, Adam Kozakiewicz, Gregory Blanc. |
|
查看
|
回報問題連結 |
Theoretical cybersecurity :principles and advanced concepts / |
Jacob G. Oakley, Michael Butler, Wayne York, Matthew Puckett, J. Louis Sewell. |
|
查看
|
回報問題連結 |
Breaking into information security:crafting a custom career path to get the job you really want / |
Josh More, Anthony J. Stieber, Chris Liu. |
2015 |
查看
|
回報問題連結 |
Cyber security and network security |
Sabyasachi Pramanik ... [et al.]. |
2022 |
查看
|
回報問題連結 |
Computer security, privacy, and politics:current issues, challenges, and solutions / |
Ramesh Subramanian [editor]. |
2008 |
查看
|
回報問題連結 |
Firewalls don't stop dragons :a step-by-step guide to computer security for non-techies / |
Carey Parker. |
|
查看
|
回報問題連結 |
Safety management for software-based equipment |
Jean-Louis Boulanger. |
2013 |
查看
|
回報問題連結 |
Security for the digital world within an ethical framework |
the Digital Enlightenment Forum. |
2016 |
查看
|
回報問題連結 |
Cybersecurity and applied mathematics / |
Leigh Metcalf, William Casey. |
|
查看
|
回報問題連結 |
Modern cybersecurity strategies for enterprises:protect and secure your enterprise networks, digital business assets, and endpoint security with tested and proven methods / |
Ashish Mishra. |
2023 |
查看
|
回報問題連結 |
|