Tiān-náu an-choân
Guā-māu
Tēn-náu an-tsuân, bāng-lōo an-tsuân, hi̍k-tsiá sìn-sit ki-su̍t an-tsuân (IT an-tsuân) (ing-gú: Computer security, cybersecurity (cyber security), information technology security (IT security)) sī pó-hōo tēn-náu hē-thóng hām bāng-lōo bén-siū sìn-sit sia̍p-lōo, tsha̍t-thau hi̍k-tsiá sún-hāi i-ê ngē-thé , nńg-thé hi̍k-tsiá tēn-tsí sòo-kì, í-kip bén-siū kan-jiáu hi̍k gōo-tō in thê-kiong ê ho̍k-bū.[1][2]
Tsù-kái
[siu-kái | kái goân-sí-bé]- ↑ Schatz, Daniel; Bashroush, Rabih; Wall, Julie (2017). "Towards a More Representative Definition of Cyber Security". Journal of Digital Forensics, Security and Law (ēng Eng-gí). 12 (2). ISSN 1558-7215. (Eng-gí)
- ↑ "computer security | Definition & Facts | Britannica". www.britannica.com (ēng Eng-gí). 2022-07-12 khòaⁿ--ê. (Eng-gí)
Ên-sin ua̽t-to̽k
[siu-kái | kái goân-sí-bé]Tô͘-su-koán chu-goân about Tiān-náu an-choân |
- Jeremy Bob, Yonah (2021) "Ex-IDF cyber intel. official reveals secrets behind cyber offense". The Jerusalem Post
- Branch, J. (2020). "What's in a Name? Metaphors and Cybersecurity." International Organization.
- Costigan, Sean; Hennessy, Michael (2016). Cybersecurity: A Generic Reference Curriculum (PDF). NATO. ISBN 978-9284501960.
- Fuller, Christopher J. "The Roots of the United States’ Cyber (In)Security," Diplomatic History 43:1 (2019): 157–185. online
- Kim, Peter (2014). The Hacker Playbook: Practical Guide To Penetration Testing. Seattle: CreateSpace Independent Publishing Platform. ISBN 978-1494932633.
- Lee, Newton (2015). Counterterrorism and Cybersecurity: Total Information Awareness (2nd pán.). Springer. ISBN 978-3319172439.
- Montagnani, Maria Lillà and Cavallo, Mirta Antonella (26 July 2018). "Cybersecurity and Liability in a Big Data World". SSRN.
- Singer, P. W.; Friedman, Allan (2014). Cybersecurity and Cyberwar: What Everyone Needs to Know. Oxford University Press. ISBN 978-0199918119.
- Wu, Chwan-Hwa (John); Irwin, J. David (2013). Introduction to Computer Networks and Cybersecurity. Boca Raton: CRC Press. ISBN 978-1466572133.
- M. Shariati et al. / Procedia Computer Science 3 (2011) 537–543. Enterprise information security, a review of architectures and frameworks from interoperability perspective
Tsham-ua̽t
[siu-kái | kái goân-sí-bé]- Si̍t-tsìng huat-ha̍k gián-kiù (Empirical legal studies)
- Tok-hú-sí (Đốc phủ sứ)
- Hayashi Yoshimasa
- Gôlôsu tè-kok gē-su̍t ha̍k-īñ (Imperial Academy of Arts)
- Ūn-tôo (韻圖)
Guā-pōo lên-ket
[siu-kái | kái goân-sí-bé]- Computers & Security (Eng-gí)
- Computer Security - Overview (Eng-gí)
|