美国信息安全大会
会议文档
ast2-w02_how-can-cisos-obtain-pertinent-information-in-the-real-world12 p
pdf ast2-w02_how-can-cisos-obtain-pertinent-information-in-the..
  • 上传人: 豆丁会议
  • 2017-03-09 13:42
  • 0
  • 评论0
  • 收藏2
ast2-r02_the-nist-cybersecurity-framework-who-what-where1 p
pdf ast2-r02_the-nist-cybersecurity-framework-who-what-where
  • 上传人: 豆丁会议
  • 2017-03-09 13:42
  • 0
  • 评论0
  • 收藏2
ast1-w02_internet-of-insecurity-can-industry-solve-it-or-is-regulation-required_copy111 p
pdf ast1-w02_internet-of-insecurity-can-industry-solve-it-or-i..
  • 上传人: 豆丁会议
  • 2017-03-09 13:42
  • 0
  • 评论0
  • 收藏2
ast1-r02_making-the-business-case-for-managing-cyber-risk1 p
pdf ast1-r02_making-the-business-case-for-managing-cyber-risk
  • 上传人: 豆丁会议
  • 2017-03-09 13:42
  • 0
  • 评论0
  • 收藏2
asd-w03_collaborative-security-securing-open-source-software27 p
pdf asd-w03_collaborative-security-securing-open-source-software
  • 上传人: 豆丁会议
  • 2017-03-09 13:43
  • 0
  • 评论0
  • 收藏2
asd-w02_avoiding-pitfalls-of-static-analysis44 p
pdf asd-w02_avoiding-pitfalls-of-static-analysis
  • 上传人: 豆丁会议
  • 2017-03-09 13:43
  • 0
  • 评论0
  • 收藏2
asd-t10f_saving-cve-with-opensource30 p
pdf asd-t10f_saving-cve-with-opensource
  • 上传人: 豆丁会议
  • 2017-03-09 13:43
  • 0
  • 评论0
  • 收藏2