8 results
Advanced search
Yushi Nagao
1-8
/Total: 8 results

Article etc.
"Comprehensive Review of Security Incident Response by Type of Cyberattack Method: Attack Method and Response (5) Unauthorized Account Log-ins"
Publication:Business Houmu Vol.25 No.1

Article etc.
"Comprehensive Review of Security Incident Response by Type of Cyberattack Method: Attack Method and Response (4) Phishing Scams and Unlawful Cash Transfers"
Publication:Business Houmu Vol.25 No.1

Article etc.
"Analysis of Voting Policy for Institutional Investors and Outcomes -2021 version-"
Publication:Shojihomu: Supplemental Issue
No.463
No.463

Article etc.
"Analysis of Voting Policy for Institutional Investors and Outcomes -2021 version- (Part 1)"
Publication:Shojihomu: Supplemental Issue
No.444
No.444

Book
"Analysis of Voting Policy for Institutional Investors and Outcomes (2020 version)"
Publication:Shojihomu: Supplemental Issue
No.453
No.453

Article etc.
"Analysis of Voting Policy for Institutional Investors and Outcomes -2020 version- (Part 1)"
Publication:Shojihomu: Supplemental Issue
No.432
No.432