Studies in Information Security Management from Methods of Social Network
碩士 === 中國文化大學 === 資訊安全產業研發碩士專班 === 99 === Because of Internet's universalization, the information system already became an indispensable feature of life. Now the people face the question of information security emerges one after another incessantly. Therefore the information security managem...
Main Authors: | Chuang, Sheng-Chieh, 莊勝傑 |
---|---|
Other Authors: | Tsai, Dwen-Ren |
Format: | Others |
Language: | zh-TW |
Published: |
2011
|
Online Access: | http://ndltd.ncl.edu.tw/handle/19908438693374793560 |
Similar Items
-
Study of network security isolation technology - from the perspective of Information Security Management
by: Li-Fu Chuang, et al.
Published: (2010) -
Cluster-RLM : Establishing a Routing Path with Cluster-based Redundant Link Minimization in Wireless Sensor Networks for Energy Saving
by: Sheng-Chieh Chuang, et al.
Published: (2016) -
The Study of Risk Management on Information Security – A Case Study of the Information Engine Room
by: CHUANG KAI YIN, et al.
Published: (2010) -
The Study on the Factors of Affecting the Customer Satisfaction for Internet Securities Trading
by: Chao-sheng Chuang, et al.
Published: (2008) -
A study on information security management system and implementation of a secure enterprise network
by: Tung-Sheng Cheng, et al.
Published: (2005)