메뉴 건너뛰기




Volumn 18, Issue 4, 1999, Pages 322-334

Computer security - what should you spend your money on?

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER CRIME; DATA COMMUNICATION SYSTEMS; LAWS AND LEGISLATION; RISK MANAGEMENT;

EID: 0032632088     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/S0167-4048(99)80078-9     Document Type: Article
Times cited : (13)

References (12)
  • 5
    • 0031372393 scopus 로고    scopus 로고
    • "penetration testing and system audit"
    • Andy Jones, "penetration testing and system audit", Computers & Security, 16 (1997) 595-602.
    • (1997) Computers & Security , vol.16 , pp. 595-602
    • Jones, A.1
  • 6
    • 4243963067 scopus 로고    scopus 로고
    • "macro attacks: A new generation of security threats"
    • October
    • Pete Simpson, "macro attacks: A new generation of security threats", Information Security Bulletin, Volume 2, Issue 5 October 1997, pp. 33-38.
    • (1997) Information Security Bulletin , vol.2 , Issue.5 , pp. 33-38
    • Simpson, P.1
  • 8
    • 51249090257 scopus 로고    scopus 로고
    • "managing network security: The seedy side of security"
    • August
    • Fred Cohen, "managing network security: The seedy side of security", pp. 9-13, Network Security, August 1998.
    • (1998) Network Security , pp. 9-13
    • Cohen, F.1
  • 9
    • 85031637618 scopus 로고    scopus 로고
    • http://www.infoworld.com/cgibin/displayTC.pl?/980504comp.htm


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.