-
1
-
-
84874666102
-
-
Bitpipe.com
-
Bitpipe.com, 2007. Network monitoring. http://www.bitpipe.com/tlist/Network-Monitoring.html.
-
(2007)
Network monitoring
-
-
-
2
-
-
0042217161
-
Security in open and distributed system
-
Caelli, W.J., 1994. Security in open and distributed system. Inform. Manage. Comput. Secur., 2: 18-24.
-
(1994)
Inform. Manage. Comput. Secur.
, vol.2
, pp. 18-24
-
-
Caelli, W.J.1
-
3
-
-
67650084392
-
Collaborative commerce in supply chain management: A study of adoption status in malaysian electrical and electronic industry
-
Chong, A.Y.L. and K.B. Ooi, 2008. Collaborative commerce in supply chain management: A study of adoption status in malaysian electrical and electronic industry. J. Applied Sci., 8: 3836-3844.
-
(2008)
J. Applied Sci.
, vol.8
, pp. 3836-3844
-
-
Chong, A.Y.L.1
Ooi, K.B.2
-
4
-
-
51249090257
-
Managing networks security: Simulating network security
-
Cohen, F., 1999. Managing networks security: Simulating network security. Network Secur., 4: 6-13.
-
(1999)
Network Secur.
, vol.4
, pp. 6-13
-
-
Cohen, F.1
-
5
-
-
0032164246
-
Network security: It's time to take it seriously
-
Down, P.W. and J.T. McHenry, 1998. Network security: It's time to take it seriously. IEEE Comput. Soc., 31: 24-28.
-
(1998)
IEEE Comput. Soc.
, vol.31
, pp. 24-28
-
-
Down, P.W.1
McHenry, J.T.2
-
6
-
-
84874654293
-
-
Eset.com
-
Eset.com, 2007. Definitions of malware: Rootkit. http://www.eset.com/threat-center/threats/rootkit.php.
-
(2007)
Definitions of malware: Rootkit
-
-
-
7
-
-
84888295144
-
Security and network management: Changes in the way we work
-
Forcht, K.A. and Y.W.A. Tsai, 1994. Security and network management: Changes in the way we work. Inform. Manage. Comput. Secur., 2: 35-41.
-
(1994)
Inform. Manage. Comput. Secur.
, vol.2
, pp. 35-41
-
-
Forcht, K.A.1
Tsai, Y.W.A.2
-
10
-
-
69049120867
-
Designing Secure Networks Based on the Software Process Model
-
Digital Integrity LLC., Springer
-
Innella, P., 2000. Designing Secure Networks Based on the Software Process Model. Tetrad. Digital Integrity LLC., Springer.
-
(2000)
Tetrad
-
-
Innella, P.1
-
11
-
-
0347273061
-
-
1st Edn., Addison Wesley, Boston
-
Laudon, C.K. and C.G. Traver, 2002. E-commerce: Business, Technology, Society. 1st Edn., Addison Wesley, Boston, pp: 235-236.
-
(2002)
E-commerce: Business, Technology, Society
, pp. 235-236
-
-
Laudon, C.K.1
Traver, C.G.2
-
13
-
-
0036192089
-
Evaluation and selection of an antivirus and content filtering software
-
Mamaghani, F., 2002. Evaluation and selection of an antivirus and content filtering software. Inform. Manage. Comput. Secur., 10: 28-32.
-
(2002)
Inform. Manage. Comput. Secur.
, vol.10
, pp. 28-32
-
-
Mamaghani, F.1
-
16
-
-
0042484572
-
CSI/FBI computer crime and security survey
-
Power, R., 2002. CSI/FBI computer crime and security survey. Comput. Secur. Issues Trends, 8: 1-22.
-
(2002)
Comput. Secur. Issues Trends
, vol.8
, pp. 1-22
-
-
Power, R.1
-
17
-
-
77954795581
-
2008 CSI/FBI computer crime and security survey
-
Richardson, R., 2008. 2008 CSI/FBI computer crime and security survey. Comput. Secur. Issues Trends, 8: 1-30.
-
(2008)
Comput. Secur. Issues Trends
, vol.8
, pp. 1-30
-
-
Richardson, R.1
-
19
-
-
38349163767
-
User perceptions of software with embedded spyware
-
Sipior, J.C. and B.T. Ward, 2008. User perceptions of software with embedded spyware. Inform. Manage. Comput. Secur., 21: 13-23.
-
(2008)
Inform. Manage. Comput. Secur.
, vol.21
, pp. 13-23
-
-
Sipior, J.C.1
Ward, B.T.2
-
20
-
-
0003902428
-
-
4th Edn., Prentice Hall, Upper Saddle River, New Jersey, ISBN: 0130914290
-
Stallings, W., 2006. Cryptography and Network Security: Principles and Practice. 4th Edn., Prentice Hall, Upper Saddle River, New Jersey, ISBN: 0130914290.
-
(2006)
Cryptography and Network Security: Principles and Practice
-
-
Stallings, W.1
-
21
-
-
19444365650
-
Information security technologies as a commodity input
-
Steward, A., 2005. Information security technologies as a commodity input. Inform. Manage. Comput. Secur., 13: 5-15.
-
(2005)
Inform. Manage. Comput. Secur.
, vol.13
, pp. 5-15
-
-
Steward, A.1
-
22
-
-
69049113015
-
-
The Star Malaysia, Malaysia, Sept. 8, 1992
-
The Star Malaysia, 1986. 17, 712 bank fraud cases since 1986. Malaysia, Sept. 8, 1992.
-
(1986)
17, 712 Bank Fraud Cases since 1986
-
-
|