Skip to content

ชมรมลูกศิษย์ ศ.ดร.ประสงค์ ฯ

  • Home
  • HOME
Home Cyber-Physical Maritime Cybersecurity: A Guide for Leaders and Managers Paperback – February 4, 2022

Maritime Cybersecurity: A Guide for Leaders and Managers Paperback – February 4, 2022

Cyber-Physical admin — 27.04.2024 Comments off
Gary C. Kessler_ Steven D. Shepard – Maritime Cybersecurity A Guide for Leaders and Managers (2022)ดาวน์โหลด

Related Posts

Cybersecurity 2022 Kids Safe Online Activity Book

Mastering Defensive Security: Effective techniques to secure your Windows, Linux, IoT, and cloud infrastructure

Defensive Security Handbook: Best Practices for Securing Infrastructure

Identity Theft Handbook Detection, Prevention, and Security

[ISO/IEC 21827:2008] Information technology — Security techniques — Systems Security Engineering — Capability Maturity Model® (SSE-CMM®)

วิธีปฏิบัติงานด้านความมั่นคงปลอดภัยไซเบอร์ภาครัฐ (Practices for Government Cybersecurity)

admin

  • AI (75)
    • Ethics (3)
  • Architectures (18)
  • Big Data (3)
  • Blockchain (10)
  • Conference Proceedings (17)
  • cyber psychology (4)
  • Cyber Sovereignty (3)
  • Cyber-Physical (10)
  • Cybersecurity (69)
  • Cybersecurity Architecture (3)
  • Cybersecurity Awareness (1)
  • Cybersecurity Capability Maturity Model (C2M2) (3)
  • Data Analysis (5)
  • Data Science (5)
  • Deep Learning (18)
  • Engineering (6)
  • Frameworks (5)
  • Fuzzy (1)
  • ISO (1)
  • Large language models (LLMs) (3)
  • Machine Learning (47)
  • Management (1)
  • Metaverse (1)
  • NIST Special Publication (3)
  • Other (2)
  • Paper (1)
  • Programming (9)
  • Python (4)
  • Research Report (1)
  • Secure coding (1)
  • Systems Analysis and Design (5)
  • Technology (1)
  • thesis (2)
  • Tools (1)
  • การเขียนเชิงวิชาการ (3)
  • วารสารวิชาการ (1)
  • เอกสารคู่มือ (6)
  • เอกสารอ้างอิง (2)
  • Cybersecurity 2022 Kids Safe Online Activity Book
  • Mastering Defensive Security: Effective techniques to secure your Windows, Linux, IoT, and cloud infrastructure
  • Defensive Security Handbook: Best Practices for Securing Infrastructure
  • Automate It with Zapier and Generative AI Harness the power of no-code workflow automation and AI
  • Rapid Product Development with n8n: Practical guide to creating digital products on the web using workflow automation and n8n
  • Identity Theft Handbook Detection, Prevention, and Security
  • [ISO/IEC 21827:2008] Information technology — Security techniques — Systems Security Engineering — Capability Maturity Model® (SSE-CMM®)
  • CERT Resilience Management Model (CERT-RMM) A Maturity Model for Managing Operational Resilience (SEI Series in Software Engineering)
  • AI Value Creators
  • AI Engineering: Building Applications with Foundation Models

2014 2016 2017 2018 2019 2020 2021 2022 2023 Academic Academic Writing AI Ariel Evans BERNARD FOX Beyond Security ChatGPT DANIELLE C. TARRAF Data Visualization DGA Dr. Magda Lilia Chelly ECTI ECTI2023 GUY WEICHENBERG JONATHAN WILLIAM WELBURN Mark Sweeney Melissa de Vel-Palumbo MYRON HURA NCCIT NCCIT2020 NCCIT2021 NCCIT2022 NCCIT2023 Neural Networks NIST NSCIC Proceedings Python risk SUZANNE GENC UNESCO Writing Zero Trust ปัญญาประดิษฐ์ มหาวิทยาลัยเทคโนโลยีพระจอมเกล้าพระนครเหนือ แผนพัฒนา

© 2025 ชมรมลูกศิษย์ ศ.ดร.ประสงค์ ฯ - Theme by WPEnjoy · Powered by WordPress