habile 发表于 2025-3-25 06:05:50

https://doi.org/10.1007/978-94-009-4496-1he United States Department of Defense (DoD) has large networked systems that span the globe, crossing multiple intra-organizational systems. This larger network includes Information Systems typical of enterprise networks, SCADA Systems monitoring critical infrastructure, newer Cyber-physical system

薄荷醇 发表于 2025-3-25 08:48:41

http://reply.papertrans.cn/32/3116/311547/311547_22.png

Pessary 发表于 2025-3-25 13:43:43

http://reply.papertrans.cn/32/3116/311547/311547_23.png

能量守恒 发表于 2025-3-25 16:28:21

M. Barracó-Serra,Maa Adriá-Casasially in multi-site enterprises or when sharing e-documents with third party. For that purpose, enterprises use document management software. However, document leakage is the most challenging security issue. These leaks are mainly caused by internal attack wither intentional or due to accident and e

ACME 发表于 2025-3-25 21:34:59

https://doi.org/10.1007/978-3-319-54380-2Computer Science; Informatics; Conference Proceedings; Research; Applications; algorithm analysis and pro

Cholagogue 发表于 2025-3-26 03:33:53

Victor Chang,Muthu Ramachandran,Gary WillsIncludes supplementary material:

细丝 发表于 2025-3-26 06:38:14

http://reply.papertrans.cn/32/3116/311547/311547_27.png

诗集 发表于 2025-3-26 11:02:05

978-3-319-54379-6Springer International Publishing AG 2017

环形 发表于 2025-3-26 13:53:59

http://reply.papertrans.cn/32/3116/311547/311547_29.png

我怕被刺穿 发表于 2025-3-26 20:22:37

Conference proceedings 2017people, data and computing applications. The book provides selected papers of the Second International Workshop on Enterprise Security held in Vancouver, Canada, November 30-December 3, 2016 in conjunction with CloudCom 2015..The 11 papers were selected from 24 submissions and provide a comprehensiv
页: 1 2 [3] 4 5 6
查看完整版本: Titlebook: Enterprise Security; Second International Victor Chang,Muthu Ramachandran,Gary Wills Conference proceedings 2017 Springer International Pub