Nefarious 发表于 2025-4-1 03:42:18

http://reply.papertrans.cn/67/6648/664787/664787_61.png

CLAN 发表于 2025-4-1 08:21:48

http://reply.papertrans.cn/67/6648/664787/664787_62.png

蚀刻术 发表于 2025-4-1 11:17:14

http://reply.papertrans.cn/67/6648/664787/664787_63.png

Infraction 发表于 2025-4-1 17:24:16

http://reply.papertrans.cn/67/6648/664787/664787_64.png

易发怒 发表于 2025-4-1 19:45:23

Identity Theft — Empirical evidence from a Phishing Exerciseimportant part of ICT security awareness; however, IT management must know and identify where to direct and focus these awareness training efforts. A phishing exercise was conducted in an academic environment as part of an ongoing information security awareness project where system data or evidence

压碎 发表于 2025-4-1 23:31:22

http://reply.papertrans.cn/67/6648/664787/664787_66.png

担忧 发表于 2025-4-2 04:19:05

http://reply.papertrans.cn/67/6648/664787/664787_67.png
页: 1 2 3 4 5 6 [7]
查看完整版本: Titlebook: New Approaches for Security, Privacy and Trust in Complex Environments; Proceedings of the I Hein Venter,Mariki Eloff,Rossouw Solms Confere