|
Volumn 26, Issue 2, 2007, Pages 183-185
|
Investigative response: After the breach
|
Author keywords
Breach; Compromise; Cybertrust; Forensics; Fraud; Identity Theft; Incident; Investigative Response
|
Indexed keywords
COMPUTER SYSTEM FIREWALLS;
DATA PRIVACY;
SECURITY OF DATA;
CYBERTRUST;
FORENSICS;
IDENTITY THEFT;
INVESTIGATIVE RESPONSE;
COMPUTER CRIME;
|
EID: 33947223504
PISSN: 01674048
EISSN: None
Source Type: Journal
DOI: 10.1016/j.cose.2006.08.012 Document Type: Article |
Times cited : (3)
|
References (0)
|