Basic Search / Search Result

  • Search Result: 4results Search Strategy: "Graduate Institute of Management".edept (Phrase) and ekeyword.raw="information security"


  • Refine the results: Search Expand the trend chart of search results

  • Individualized services

    My Search Strategy

  • Sort:

      
  • Selected0results


      Select all on this page

    1

    Focus on Information Security, Co-Opetition in Cloud Service - A case study of Openfind Software Company
    • Graduate Institute of Management /111/ Master
    • Author: Shih-Feng Chang Advisor: Cheng-Kang Chen
    • Openfind Information Technology Co., Ltd., a software developer that uses its proprietary technolog…
    • Clicks: 304Downloads: 6
    • Full text public date 2024/05/30 (Internet public)
    • Full text public date 2024/05/30 (National library)

    2

    An Intrusion Event Initialized From The Email Social Engineering Attack
    • Graduate Institute of Management /102/ Master
    • Author: Chi - Sheng Kao Advisor: Ruey Huei Yeh
    • This study applies the writing method of Harvard case study. The study states the organization impl…
    • Clicks: 283Downloads: 2
    • Full text public date 2019/07/21 (Intranet public)
    • Full text public date This full text is not authorized to be published. (Internet public)
    • Full text public date This full text is not authorized to be published. (National library)

    3

    Discussion on Product Pricing Strategy of the Professional Services - Taking CyberSecurity Penetration test Service as an Example

    4

    A Study on the Business Application and Expansion of Database Activity Monitoring
    • Graduate Institute of Management /101/ Master
    • Author: I-chun Wu Advisor: Shih-chen Huang
    • This thesis elaborates how to apply the technology of Database Activity Monitoring (DAM) to databas…
    • Clicks: 274Downloads: 1
    • Full text public date 2018/01/28 (Intranet public)
    • Full text public date This full text is not authorized to be published. (Internet public)
    • Full text public date This full text is not authorized to be published. (National library)
    1