Published inCyOpsNIST Cybersecurity Framework (CSF) 2.0 versus ISO/IEC 27001:2022IntroductionOct 10Oct 10
Published inRootCertETSI EN 319 411–1 V1.4.0 (2023–07)สรุปที่สําคัญของ ETSI EN 319 411–1 V1.4.0 (2023–07) ในภาษาไทยสําหรับกองทุนกู้ยืมเพื่อการศึกษา…Oct 31, 2023Oct 31, 2023
Published inCyOpsWeb Site Security1. Perimeter Security (ความปลอดภัยที่ขอบเขต):Oct 30, 2023Oct 30, 2023
Published inCyOpsSplunk’s Search Processing Language (SPL) and Swimlane’s SOAR (Security, Orchestration, Automation…Splunk’s Search Processing Language (SPL) and Swimlane’s SOAR (Security, Orchestration, Automation, and Response) platform serve somewhat…Oct 5, 2023Oct 5, 2023
Published inCyOpsSecurity Design DocumentOverview: Now that you’re super knowledgeable about security, let’s put your newfound know-how to the test.Jul 24, 2023Jul 24, 2023
Published inGovOpenDataImports, Data Analysis, Results and/or EvaluationThis is the rubric for the Course 2 end-of-course project. The rubric was designed to be applicable to all of the project scenarios. You…Jul 20, 2023Jul 20, 2023
Published inGovOpenDataPACE Strategy DocumentThis is the rubric for the Course 1 end-of-course project. The rubric was designed to be applicable to all of the project scenarios. You…Jul 19, 2023Jul 19, 2023
Published inStudentLoanFundเทคโนโลยีสำคัญในยุคเศรษฐกิจดิจิทัล: ภาษี การเงิน และธุรกิจ by ดร. พณชิต กิตติปัญญางามJun 19, 2023Jun 19, 2023