Skip to content
ชมรมลูกศิษย์ ศ.ดร.ประสงค์ ฯ
Menu
Home
Home
Cybersecurity
Cybersecurity
Generative AI Cybersecurity and Ethics
admin
—
17.01.2025
Comments off
Read more
E-banking, Fintech, _ Financial Crimes The Current Economic and Regulatory Landscape 2024th Edition
admin
—
29.10.2024
Comments off
Read more
Information Security Incident and Data Breach Management A Step-by-Step Approach First Edition
admin
—
29.10.2024
Comments off
Read more
Resilient Cybersecurity Reconstruct your defense strategy in an evolving cyber world
admin
—
30.09.2024
Comments off
Read more
A Comprehensive Guide to the NIST Cybersecurity Framework 2.0 Strategies, Implementation, and Best Practice
admin
—
05.09.2024
Comments off
Read more
Preparing for Hybrid Threats to Security Collaborative Preparedness and Response
admin
—
05.09.2024
Comments off
Read more
Cyber SecurityIntelligence and Analytics (CSIA 2022), Volume 1
admin
—
13.08.2024
Comments off
Read more
Secrets of a Cyber Security Architect
admin
—
24.06.2024
Comments off
Read more
Implementing Enterprise Cyber Security with Open-Source Software and Standard Architecture Volume II
admin
—
24.06.2024
Comments off
Read more
Hands-on cybersecurity for architects plan and design robust security architectures
admin
—
24.06.2024
Comments off
Read more
OWASP_Code_Review_Guide_v2
admin
—
18.06.2024
Comments off
Read more
Secure and Smart Cyber-Physical Systems
admin
—
08.06.2024
Comments off
Read more
Implementing Enterprise Cybersecurity with Open-source Software and Standard Architecture (River Publishers Series in Security and Digital Forensics)
admin
—
20.05.2024
Comments off
Read more
Practical Cybersecurity Architecture: A guide to creating and implementing robust designs for cybersecurity architects
admin
—
20.05.2024
Comments off
Read more
Maritime Cybersecurity: A Guide for Leaders and Managers Paperback – February 4, 2022
admin
—
27.04.2024
Comments off
Read more
Cybersecurity and High-Performance Computing Environments
admin
—
24.04.2024
Comments off
Read more
Applying Artificial Intelligence in Cybersecurity Analytics and Cyber Threat Detection
admin
—
22.04.2024
Comments off
Read more
Cybersecurity Capability Maturity Model (C2M2) v2.1
admin
—
09.04.2024
Comments off
Read more
Cognitive Computing and Cyber Physical Systems 4th EAI International Conference, IC4S 2023
admin
—
07.04.2024
Comments off
Read more
Executive’s Cybersecurity Program Handbook A comprehensive guide to building and operationalizing a complete cybersecur
admin
—
04.04.2024
Comments off
Read more
Emerging Trends for Securing Cyber Physical Systems and the Internet of Things (Future Generation Information Systems)
admin
—
01.04.2024
Comments off
Read more
Cybernetical Intelligence Engineering Cybernetics with Machine Intelligence
admin
—
23.02.2024
Comments off
Read more
Responsive Security
admin
—
18.02.2024
Comments off
Read more
Phishing for Dummies eBook 2023
admin
—
24.01.2024
Comments off
Read more
Fighting Phishing Everything You Can Do to Fight Social Engineering and Phishing
admin
—
24.01.2024
Comments off
Read more
Cyber-Assurance for the Internet of Things
admin
—
24.01.2024
Comments off
Read more
Artificial Intelligence and Cybersecurity Theory and Applications
admin
—
20.01.2024
Comments off
Read more
See Yourself in Cyber Security Careers Beyond Hacking
admin
—
18.01.2024
Comments off
Read more
Human-Computer Interaction and Cybersecurity Handbook
admin
—
24.12.2023
Comments off
Read more
Computer and Cyber Security Principles, Algorithm, Applications, and Perspectives
admin
—
27.11.2023
Comments off
Read more
Confident Cyber Security The Essential Insights and How to Protect from Threats 2nd Edition
admin
—
13.10.2023
Comments off
Read more
Cyber Guardians Empowering Board Members for Effective Cybersecurity
admin
—
13.10.2023
Comments off
Read more
Cyber Persistence Theory Redefining National Security in Cyberspace
admin
—
01.10.2023
Comments off
Read more
Cyber Crime Investigator’s Field Guide 3rd.Edition
admin
—
24.08.2023
Comments off
Read more
Handbook of Information Security, Key Concepts, Infrastructure, Standards, and Protocols Volume 1
admin
—
17.08.2023
Comments off
Read more
Battlefield Cyber How China and Russia are Undermining Our Democracy and National Security
admin
—
16.08.2023
Comments off
Read more
Security Risk Management – The Driving Force for Operational Resilience The Firefighting Paradox
admin
—
17.07.2023
Comments off
Read more
Israel and the Cyber Threat How the Startup Nation Became a Global Cyber Power
admin
—
05.07.2023
Comments off
Read more
Mastering Kali Linux for Advanced Penetration Testing – Beggs, Robert
admin
—
28.06.2023
Comments off
Read more
Cybercrime Prevention Theory and Applications
admin
—
25.06.2023
Comments off
Read more
Cyber Threat Intelligence
admin
—
25.06.2023
Comments off
Read more
OWASP CODE REVIEW GUIDE 2008 V1.1
admin
—
21.06.2023
Comments off
Read more
NIST Special Publication 800-30 Guide for Conducting Risk Assessments I N F O R M A T I O N S E C U R I T Y
admin
—
13.06.2023
Comments off
Read more
Understand, Manage, and Measure Cyber Risk
admin
—
13.06.2023
Comments off
Read more
How to Measure Anything in Cybersecurity Risk
admin
—
13.06.2023
Comments off
Read more
CYBER RESILIENCE STRATEGY: A KEY GUIDE TO ENTERPRISE OPERATIONS IN DIGITAL AGE – กลยุทธ์การคืนสภาพได้ทางไซเบอร์: แนวทางในการดำเนินงานขององค์กรในยุคดิจิทัล
admin
—
14.05.2023
Comments off
Read more
เอกสารประกอบการบรรยาย งานสัมมนาให้ความรู้เกี่ยวกับ Zero Trust ในงานชื่อ Beyond Security: Zero Trust for Business Enablement
admin
—
11.05.2023
Comments off
เอกสารประกอบการบรรยาย งานสัมมน…
Read more
Practical Malware Analysis
admin
—
07.05.2023
Comments off
Read more
Cyber Strategy_ Risk-Driven Security and Resiliency
admin
—
23.04.2023
Comments off
Read more
Building a Cyber Resilient Business_ A cyber handbook for executives and boards
admin
—
23.04.2023
Comments off
Read more
Posts pagination
1
2
Next
© 2025
ชมรมลูกศิษย์ ศ.ดร.ประสงค์ ฯ
- Theme by
WPEnjoy
· Powered by
WordPress