Basic Search / Search Result

  • Search Result: 250results Search Strategy: "Security".ekeyword (Phrase)


  • Refine the results: Search Expand the trend chart of search results

  • Individualized services

    My Search Strategy

  • Sort:

      
  • Selected0results


      Select all on this page

    1

    A Framework of Aligning Information Security Performance Indicators to Business Objects with AHP- A Case Study on a Major Government Organization industry

    2

    On the Design and Implementation of Android Smartphone Security Analysis
    • Department of Information Management /104/ Master
    • Author: Sih-Cing Syu Advisor: Shi-Cho Cha
    • With the advances in smart device technologies, smart devices are usually equipped with various kin…
    • Clicks: 184Downloads: 1
    • Full text public date 2021/08/15 (Intranet public)
    • Full text public date This full text is not authorized to be published. (Internet public)
    • Full text public date This full text is not authorized to be published. (National library)

    3

    A Case Study of Entry Strategies in China of Securities Firm
    • Graduate Institute of Finance /97/ Master
    • Author: CHUN-YI LU Advisor: Day-Yang Liu
    • none
    • Clicks: 151Downloads: 0
    • Full text public date 2014/01/16 (Intranet public)
    • Full text public date This full text is not authorized to be published. (Internet public)
    • Full text public date This full text is not authorized to be published. (National library)

    4

    Designing for Office Building Security
    • Department of Architecture /102/ Master
    • Author: Isabella - Octaviena Muliyadi Advisor: Kung-Jen Tu
    • Historic case of office building attacks attest lack of adequate building security and aware archit…
    • Clicks: 93Downloads: 3

    5

    Introducing Security Management System into Securities Industry Research Taking Company A as an Example
    • Department of Information Management /107/ Master
    • Author: Shou-Ming Wang Advisor: Tzong-Chen Wu
    • In recent years, global information attacks and data breach incidents have occurred unabated, and t…
    • Clicks: 260Downloads: 0
    • Full text public date 2024/08/22 (Intranet public)
    • Full text public date This full text is not authorized to be published. (Internet public)
    • Full text public date This full text is not authorized to be published. (National library)

    6

    A Study of the Impacts of DDoS Attacks on Secure Commercial Websites
    • Department of Electronic and Computer Engineering /100/ Master
    • Author: Ming-hao Su Advisor: Shanq-Jang Ruan
    • Because almost all e-commerce sites use SSL / TLS protocol to secure the data transmission process,…
    • Clicks: 99Downloads: 2
    • Full text public date 2016/12/07 (Intranet public)
    • Full text public date This full text is not authorized to be published. (Internet public)
    • Full text public date This full text is not authorized to be published. (National library)

    7

    Wireless LAN Security Guide of Study

    8

    The Appropriation Process and Outcomes of Information Security Management System Implementation – An Adaptive Structuration Theory Perspective

    9

    A Case Study in the Efficiency Analysis of Sales Promotion by a Securities Firm
    • Graduate Institute of Finance /96/ Master
    • Author: Wen-pao Li Advisor: Day-yang Liu
    • The securities agency market faces intense competition in recent years, therefore each securities c…
    • Clicks: 113Downloads: 0
    • Full text public date 2013/07/11 (Intranet public)
    • Full text public date This full text is not authorized to be published. (Internet public)
    • Full text public date This full text is not authorized to be published. (National library)

    10

    An inquiry into the performance of merging in financial securities companies: case studies on institutional customers’ business.
    • Graduate Institute of Finance /94/ Master
    • Author: Laio-chen Lin Advisor: Yen-Sheng Huang Chiung-Ju Liang
    • As Taiwan’s financial market runs into more and more competitive surroundings in recent years, owin…
    • Clicks: 720Downloads: 4
    • Full text public date 2007/02/03 (Intranet public)
    • Full text public date This full text is not authorized to be published. (Internet public)
    • Full text public date This full text is not authorized to be published. (National library)