註記  
Computer security -- Government policy -- European Union countries : Boulet, Gertjan,   
      Cybersecurity policy in the EU and South Korea from consultation to action : theoretical and comparat 網際網路  2022
Computer security -- Government policy -- Korea (South) : Boulet, Gertjan,   
      Cybersecurity policy in the EU and South Korea from consultation to action : theoretical and comparat 網際網路  2022
Computer security -- Government policy -- United States  
      Cyber-security and threat politics [electronic resource] : US efforts to secure the information age / 網際網路  2008
      Cyber-security and threat politics : US efforts to secure the information age / Myriam Dunn Cavelty 總館  2008
      FISMA principles and best practices [electronic resource] : beyond compliance / Patrick D. Howard 網際網路  c2011
      Risk management framework [electronic resource] : a lab-based approach to securing information system 網際網路  2013
Computer security -- Graphic methods -- Congresses  
      Graphical models for security [electronic resource] : 4th International Workshop, GraMSec 2017, Santa 網際網路  2018
      Graphical models for security : 5th International Workshop, GraMSec 2018, Oxford, UK, July 8, 2018 : 網際網路  2019
      Graphical models for security : 6th International Workshop, GraMSec 2019, Hoboken, NJ, USA, June 24, 網際網路  2019
      Graphical models for security : 7th International Workshop, GraMSec 2020, Boston, MA, USA, June 22, 2 網際網路  2020
2 其他項目  
Computer security -- Handbooks, manuals, etc  
      The antivirus hacker's handbook [electronic resource] / Joxean Koret, Elias Bachaalany 網際網路  c2015
      Computer crime : a crimefighter's handbook / David Icove, Karl Seger, and William VonStorch 資訊系  c1995
      The disaster recovery handbook [electronic resource] : a step-by-step plan to ensure business continu 網際網路  c2004
      Handbook of big data privacy / edited by Kim-Kwang Raymond Choo, Ali Dehghantanha 網際網路  2020
5 其他項目  
Computer security -- History : Leeuw, Karl de   
      The history of information security [electronic resource] : a comprehensive handbook / edited by Karl 網際網路  c2007
Computer security -- Computer programs. : Tari, Zahir,   
      Data exfiltration threats and prevention techniques : machine learning and memory-based data security 網際網路  2023
Computer security -- India : Shukla, Sandeep Kumar,   
      Cyber security in India : education, research and training / edited by Sandeep Kumar Shukla, Manindra 網際網路  2020
Computer security -- International cooperation -- Congresses  
      Information Security Applications [electronic resource] : 5th International Workshop, WISA 2004, Jeju 網際網路  2005
      Information Security Applications [electronic resource] : 7th International Workshop, WISA 2006, Jeju 網際網路  2007
      Information Security Applications (vol. # 3786) [electronic resource] : 6th International Workshop, W 網際網路  2006
Computer security -- Israel : Tabansky, Lior,   
      Cybersecurity in Israel / by Lior Tabansky, Isaac Ben Israel 網際網路  2015
Computer security -- Japan : Felkner, Anna,   
      Cybersecurity research analysis report for Europe and Japan : cybersecurity and privacy dialogue betw 網際網路  2021
Computer security -- Law and legislation  
      Cyber security, artificial intelligence, data protection & the law / by Robert Walters, Marko Novak 網際網路  2021
      Cybersecurity law [electronic resource] / Jeff Kosseff 網際網路  2017
      Cyberterrorism [electronic resource] : the use of the internet for terrorist purposes 網際網路  c2007
      Digital risk governance : security strategies for the public and private sectors / by Walter Amedzro 網際網路  2020
13 其他項目  
no.

Go to Top