6 results
Advanced search
Takuya Futagami
1-6
/Total: 6 results

Article etc.
“Comprehensive Review of Security Incident Response by Type of Cyberattack Method: Attack Method and Response (2) Information Divulgence by Contractors”
Publication:Business Houmu Vol.25 No.1

Article etc.
“Comprehensive Review of Security Incident Response by Type of Cyberattack Method: Attack Method and Response (1) Ransomware Attacks”
Publication:Business Houmu Vol.25 No.1

Article etc.
"EU Data Compliance for Practitioners (GDPR and e-Privacy Regulations) "
Publication:NBL Additional Volume
No.168
No.168