5 results
Advanced search
Takuya Futagami
1-5
/Total: 5 results

Article etc.
“Comprehensive Review of Security Incident Response by Type of Cyberattack Method: Attack Method and Response (2) Information Divulgence by Contractors”
Publication:Business Houmu Vol.25 No.1

Article etc.
“Comprehensive Review of Security Incident Response by Type of Cyberattack Method: Attack Method and Response (1) Ransomware Attacks”
Publication:Business Houmu Vol.25 No.1

Article etc.
"EU Data Compliance for Practitioners (GDPR and e-Privacy Regulations) "
Publication:NBL Additional Volume
No.168
No.168