Basic Search / Search Result

  • Search Result: 7results Search Strategy: "Graduate Institute of Management".edept (Phrase) and ekeyword.raw="information security"


  • Refine the results: Search Expand the trend chart of search results

  • Individualized services

    My Search Strategy

  • Sort:

      
  • Selected0results


      Select all on this page

    1

    Focus on Information Security, Co-Opetition in Cloud Service - A case study of Openfind Software Company

    2

    A Framework of Aligning Information Security Performance Indicators to Business Objects with AHP- A Case Study on a Major Government Organization industry

    3

    An Intrusion Event Initialized From The Email Social Engineering Attack
    • Graduate Institute of Management /102/ Master
    • Author: Chi - Sheng Kao Advisor: Ruey Huei Yeh
    • This study applies the writing method of Harvard case study. The study states the organization impl…
    • Clicks: 673Downloads: 2
    • Full text public date 2019/07/21 (Intranet public)
    • Full text public date This full text is not authorized to be published. (Internet public)
    • Full text public date This full text is not authorized to be published. (National library)

    4

    Discussion on Product Pricing Strategy of the Professional Services - Taking CyberSecurity Penetration test Service as an Example

    5

    A Study on the Business Application and Expansion of Database Activity Monitoring
    • Graduate Institute of Management /101/ Master
    • Author: I-chun Wu Advisor: Shih-chen Huang
    • This thesis elaborates how to apply the technology of Database Activity Monitoring (DAM) to databas…
    • Clicks: 690Downloads: 1
    • Full text public date 2018/01/28 (Intranet public)
    • Full text public date This full text is not authorized to be published. (Internet public)
    • Full text public date This full text is not authorized to be published. (National library)

    6

    An Approach to Transmit Secret Messages via QR Code

    7

    A Case Study of Information Security Deployment and Planning for High-Tech Industry
    • Department of Information Management /100/ Master
    • Author: Chih-Ming Shen Advisor: Tzong-Chen Wu
    • The proportion of Taiwan's IC production value accounts for nearly a quarter of world-wide annual o…
    • Clicks: 1144Downloads: 9
    • Full text public date 2017/06/13 (Intranet public)
    • Full text public date This full text is not authorized to be published. (Internet public)
    • Full text public date This full text is not authorized to be published. (National library)
    1