Tiān-náu an-choân
跳至導覽
跳至搜尋
Tēn
註解 [修改]
- ↑ Schatz, Daniel; Bashroush, Rabih; Wall, Julie (2017). "Towards a More Representative Definition of Cyber Security". Journal of Digital Forensics, Security and Law (ēng Eng-gí). 12 (2). ISSN 1558-7215. (英語)
- ↑ "computer security | Definition & Facts | Britannica". www.britannica.com (ēng Eng-gí). 2022-07-12 khòaⁿ--ê. (英語)
Ên身 娃 ̽t-to̽k[修改]
圖書館資源 about Tiān-náu an-choân |
- Jeremy Bob, Yonah (2021) "Ex-IDF cyber intel。official reveals secrets behind cyber offense"。TheJerusalem Post
- Branch, J。 (2020)。 "What'sinaName? Metaphors and Cybersecurity。" International Organization.
- Costigan, Sean; Hennessy, Michael (2016). Cybersecurity: A Generic Reference Curriculum (PDF). NATO. ISBN 978-9284501960.
- Fuller, Christopher J。 "The Roots of the United States’ Cyber (怹)Security," Diplomatic History 43:1 (2019): 157–185。online
- 金, Peter (2014). The Hacker Playbook: Practical Guide To Penetration Testing. Seattle: CreateSpace Independent Publishing Platform. ISBN 978-1494932633.
- Lee, Newton (2015). Counterterrorism and Cybersecurity: Total Information Awareness (2nd pán.). Springer. ISBN 978-3319172439.
- Montagnani, Maria Lillà and Cavallo, Mirta Antonella (26 July 2018)。 "Cybersecurity and LiabilityinaBig Data World"。 SSRN。
- Singer, P。 W。; Friedman, Allan (2014). Cybersecurity and Cyberwar: What Everyone Needs to Know. Oxford University Press. ISBN 978-0199918119.
- Wu, Chwan-Hwa (John); Irwin, J。 David (2013). Introduction to Computer Networks and Cybersecurity. Boca Raton: CRC Press. ISBN 978-1466572133.
- M。 Shariati et al。 / Procedia Computer Science 3 (2011) 537–543。Enterprise information security,areview of architectures and frameworks from interoperability perspective
參娃 ̽t[修改]
- Pang-bô͘:Ill (Empirical legal studies)
- Pang-bô͘:Ill (Đốc phủ sứ)
- Hayashi Yoshimasa
- Pang-bô͘:Ill (Imperial Academy of Arts)
- Pang-bô͘:Ill (韻圖)