|
Volumn 2003, Issue 11, 2003, Pages 12-15
|
Vulnerability exploitation: The problem of protecting our weakest links
|
Author keywords
[No Author keywords available]
|
Indexed keywords
COMPUTER OPERATING SYSTEMS;
COMPUTER SOFTWARE;
SECURITY OF DATA;
SERVERS;
APPLICATION PROGRAMS;
COMPUTER CRIME;
|
EID: 0242369109
PISSN: 13613723
EISSN: None
Source Type: Journal
DOI: 10.1016/S1361-3723(03)11007-X Document Type: Note |
Times cited : (2)
|
References (15)
|