메뉴 건너뛰기




Volumn 53, Issue 8, 2004, Pages 1060-1063

Information security tools and practices: What works?

Author keywords

[No Author keywords available]

Indexed keywords

ADMINISTRATIVE DATA PROCESSING; CODES (STANDARDS); COMPUTER AIDED SOFTWARE ENGINEERING; DATA ACQUISITION; INDUSTRIAL APPLICATIONS; INFORMATION TECHNOLOGY;

EID: 3242661948     PISSN: 00189340     EISSN: None     Source Type: Journal    
DOI: 10.1109/TC.2004.45     Document Type: Article
Times cited : (17)

References (4)
  • 1
    • 0343272647 scopus 로고    scopus 로고
    • Web attacks raise chilling questions for IT
    • 11 Feb
    • J. Kerstetter and J. Madden, "Web Attacks Raise Chilling Questions for IT," Zdnet eWeek, 11 Feb. 2000, http://www.zdnet.com/eweek/stories/general/0,11011,2436607,00.html.
    • (2000) Zdnet EWeek
    • Kerstetter, J.1    Madden, J.2
  • 2
    • 16344380308 scopus 로고    scopus 로고
    • The use, misuse, and abuse of statistics in information security research
    • J.J.C.H. Ryan and T.I. Jefferson, "The Use, Misuse, and Abuse of Statistics in Information Security Research," Proc. 2003 ASEM Nat'l Conf. 2003.
    • (2003) Proc. 2003 ASEM Nat'l Conf.
    • Ryan, J.J.C.H.1    Jefferson, T.I.2
  • 4
    • 3242723936 scopus 로고    scopus 로고
    • Small Business Administration, Office of Advocacy Small Business Answer Card, Nov
    • Small Business Administration, "Small Business Answer Card,"Office of Advocacy Small Business Answer Card, http://www.sba.gov/advo/stats/ec∠scd.html, Nov. 1999.
    • (1999) Small Business Answer Card


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.