5 results
Advanced search
Yushi Nagao
1-5
/Total: 5 results

Article etc.
"Comprehensive Review of Security Incident Response by Type of Cyberattack Method: Attack Method and Response (5) Unauthorized Account Log-ins"
Publication:Business Houmu Vol.25 No.1

Article etc.
"Comprehensive Review of Security Incident Response by Type of Cyberattack Method: Attack Method and Response (4) Phishing Scams and Unlawful Cash Transfers"
Publication:Business Houmu Vol.25 No.1

Article etc.
"Analysis of Voting Policy for Institutional Investors and Outcomes -2021 version- (Part 1)"
Publication:Shojihomu: Supplemental Issue
No.444
No.444

Article etc.
"Analysis of Voting Policy for Institutional Investors and Outcomes -2020 version- (Part 1)"
Publication:Shojihomu: Supplemental Issue
No.432
No.432