The uniform procedures of penetration test and protection strategies
碩士 === 開南大學 === 資訊學院碩士班 === 106 === Nowadays, Internet is especially important. While we are in information society, hackers are prevalent threats that may cause massive damage/loss. Although not all hackers are malicious, some of them have done offensive attacks. For example, ATM was stolen more th...
Main Authors: | HUANG, ZHI-KAI, 黃志凱 |
---|---|
Other Authors: | HSU, JUNG-LUNG |
Format: | Others |
Language: | zh-TW |
Published: |
2018
|
Online Access: | http://ndltd.ncl.edu.tw/handle/g56bck |
Similar Items
-
The application of Neural Networks to the luminance and color uniformity for the LED modules
by: Zhi-kai Xu, et al.
Published: (2011) -
Application of Multi-layer Non-uniform Piers in Bridge Protection Works
by: CHANG,PO-KAI, et al.
Published: (2019) -
Penetration of non-uniform electromagnetic field into conducting body
by: Yu. M. Vasetsky
Published: (2021-04-01) -
The Estimation of the Field Cone Resistances Using Tri-axial Cone Penetration Tests
by: Wei-kai Tu, et al.
Published: (2009) -
The Relationship Between the Strategy of Credit Protection Insurance and the Penetration Rate
by: Yeh, Chin-Chia, et al.
Published: (2018)