"\\\"(其後字詞)無法查詢, 因為 聯合目錄 的查詢上限是256個字。
符合的藏品
共找到 1398 筆符合的資料
![](http://digitalarchives.tw/Images/site_detail/thumb/default.jpg)
Study of Consulting Service in...
資訊安全 顧問服務 Information security SME Consulting services 國家圖書館 20090900 期刊論文 馬維銘(Ma, Wei-ming) Study.....more
- 106/1398
![](http://digitalarchives.tw/Images/site_detail/thumb/default.jpg)
Chinas Military Development an...
China's military development Taiwan's security situation Taiwan's independence 國家圖書館 20100300 期刊論文.....more
- 107/1398
![](http://digitalarchives.tw/Images/site_detail/thumb/default.jpg)
Two LIC-Based Fast Forwarding ...
Fast forwarding Router performance Flexible forwarding Scalability Security 國家圖書館 20110500 期刊論文.....more
- 108/1398
![](http://digitalarchives.tw/Images/site_detail/thumb/default.jpg)
U.S-Japan Security Alliance Tr...
U.S.-Japan security alliance treaty Yukio Hatoyama Ichiro Ozawa Article 9 of Japanese Constitution.....more
- 109/1398
![](http://digitalarchives.tw/Images/site_detail/thumb/default.jpg)
Indoor Security Surveillance b...
Vision-based autonomous vehicle Security patrolling Vehicle location Top-view cameras 國家圖書館.....more
- 110/1398
![](http://digitalarchives.tw/Images/site_detail/thumb/default.jpg)
Philippine Constitutional Fram...
National security emergency Economic emergency Marcos Ferdinand martial law Economic development.....more
- 111/1398
![](http://digitalarchives.tw/Images/site_detail/thumb/default.jpg)
Security Challenges for User-O...
RFID NFC Security Internet of things User-oriented architecture 國家圖書館 20100500 期刊論文 Hancke, G. P.....more
- 112/1398
![](http://digitalarchives.tw/Images/site_detail/thumb/default.jpg)
Constructing Enterprise Inform...
Ontology Information security Risk management Propose and revise 國家圖書館 20100300 期刊論文 Liu, Fong-hao.....more
- 113/1398
![](http://digitalarchives.tw/Images/site_detail/thumb/default.jpg)
East Asian Security Revisited ...
East Asian security European integration Reconcilitaion Historical legacies Institution-building 國家.....more
- 114/1398
![](http://digitalarchives.tw/Images/site_detail/thumb/default.jpg)
Takushi Otani, Out of Control...
Internet Peer-to-peer technology P2P technology Information sharing Security Anonymity 國家圖書館.....more
- 115/1398
![](http://digitalarchives.tw/Images/site_detail/thumb/default.jpg)
A Software-embedded Method of ...
signature Security Software-embedded 國家圖書館 20100800 期刊論文 Lien, Chung-yueh Kao, Tsair Hsiao, Chia-hung.....more
- 116/1398
![](http://digitalarchives.tw/Images/site_detail/thumb/default.jpg)
An Intelligent Internet Key Ex...
IPsec IP security Internet key exchange protocol IKE protocol Denial-of-service attacks DoS attacks.....more
- 117/1398
![](http://digitalarchives.tw/Images/site_detail/thumb/default.jpg)
Group RFID Coordination Manage...
RFID group coordination management Family tag identification Privacy and security Business model 國家.....more
- 118/1398
![](http://digitalarchives.tw/Images/site_detail/thumb/default.jpg)
The U.S. Governments Homeland ...
September 11 incident Office of homeland security Risk management threat assessment Terrorism 國家圖書館.....more
- 119/1398
![](http://digitalarchives.tw/Images/site_detail/thumb/default.jpg)
A Framework for Scalable Multi...
Group communications Information flow Key management Multicast Information security 國家圖書館 20020700.....more
- 120/1398