Skip to content

ชมรมลูกศิษย์ ศ.ดร.ประสงค์ ฯ

  • Home
  • HOME
Home Cybersecurity [ISO/IEC 21827:2008] Information technology — Security techniques — Systems Security Engineering — Capability Maturity Model® (SSE-CMM®)

[ISO/IEC 21827:2008] Information technology — Security techniques — Systems Security Engineering — Capability Maturity Model® (SSE-CMM®)

Cybersecurity admin — 10.05.2025 Comments off
[ISOIEC 218272008] Information technology — Security techniques — Systems Security Engineering — Capability Maturity Model® (SSE-CMM®)Download

Related Posts

Cybersecurity 2022 Kids Safe Online Activity Book

Mastering Defensive Security: Effective techniques to secure your Windows, Linux, IoT, and cloud infrastructure

Defensive Security Handbook: Best Practices for Securing Infrastructure

Identity Theft Handbook Detection, Prevention, and Security

AI Engineering: Building Applications with Foundation Models

Mastering Digital Electronics

admin

  • AI (77)
    • Ethics (3)
  • Architectures (18)
  • Big Data (3)
  • Blockchain (10)
  • Conference Proceedings (19)
  • cyber psychology (4)
  • Cyber Sovereignty (3)
  • Cyber-Physical (10)
  • Cybersecurity (69)
  • Cybersecurity Architecture (3)
  • Cybersecurity Awareness (1)
  • Cybersecurity Capability Maturity Model (C2M2) (3)
  • Data Analysis (5)
  • Data Science (5)
  • Deep Learning (18)
  • Engineering (6)
  • Frameworks (5)
  • Fuzzy (1)
  • ISO (1)
  • Large language models (LLMs) (4)
  • Machine Learning (48)
  • Management (1)
  • Metaverse (1)
  • NIST Special Publication (3)
  • Other (2)
  • Paper (1)
  • Programming (9)
  • Python (4)
  • Research Report (1)
  • Secure coding (1)
  • Systems Analysis and Design (5)
  • Technology (1)
  • thesis (2)
  • Tools (1)
  • การเขียนเชิงวิชาการ (3)
  • วารสารวิชาการ (1)
  • เอกสารคู่มือ (6)
  • เอกสารอ้างอิง (2)
  • Proceedings of the International Conference on Cybersecurity, Situational Awareness and Social Media Cyber Science 2023
  • Automating Workflows with GitHub Actions: Automate software development workflows and seamlessly deploy your applications using GitHub Actions
  • Generative AI with LangChain Build large language model (LLM) apps with Python, ChatGPT and other LLMs
  • Machine Learning for Decision Sciences with Case Studies in Python
  • NCCIT2025 Proceedings
  • Cybersecurity 2022 Kids Safe Online Activity Book
  • Mastering Defensive Security: Effective techniques to secure your Windows, Linux, IoT, and cloud infrastructure
  • Defensive Security Handbook: Best Practices for Securing Infrastructure
  • Automate It with Zapier and Generative AI Harness the power of no-code workflow automation and AI
  • Rapid Product Development with n8n: Practical guide to creating digital products on the web using workflow automation and n8n

2014 2016 2017 2018 2019 2020 2021 2022 2023 Academic Academic Writing AI Ariel Evans BERNARD FOX Beyond Security ChatGPT DANIELLE C. TARRAF Data Visualization DGA Dr. Magda Lilia Chelly ECTI ECTI2023 GUY WEICHENBERG JONATHAN WILLIAM WELBURN Mark Sweeney Melissa de Vel-Palumbo MYRON HURA NCCIT NCCIT2020 NCCIT2021 NCCIT2022 NCCIT2023 Neural Networks NIST NSCIC Proceedings Python risk SUZANNE GENC UNESCO Writing Zero Trust ปัญญาประดิษฐ์ มหาวิทยาลัยเทคโนโลยีพระจอมเกล้าพระนครเหนือ แผนพัฒนา

© 2025 ชมรมลูกศิษย์ ศ.ดร.ประสงค์ ฯ - Theme by WPEnjoy · Powered by WordPress