|
Volumn 8, Issue 2, 2003, Pages 55-64
|
Management strategies for implementing forensic security measures
|
Author keywords
[No Author keywords available]
|
Indexed keywords
COMPUTER CRIME;
COMPUTER NETWORKS;
COMPUTER SYSTEM RECOVERY;
INFORMATION MANAGEMENT;
LAW ENFORCEMENT;
LAWS AND LEGISLATION;
PUBLIC POLICY;
SOCIETIES AND INSTITUTIONS;
INFRASTRUCTURE;
SECURITY OF DATA;
|
EID: 1942505732
PISSN: 13634127
EISSN: None
Source Type: Journal
DOI: 10.1016/S1363-4127(03)00207-3 Document Type: Note |
Times cited : (18)
|
References (8)
|