|
Volumn 15, Issue 1-2, 1997, Pages 92-95
|
After the break-in occurs: How to handle the student hacker
a |
Author keywords
Alabama University; Computer security; Hacking; Policy; Students
|
Indexed keywords
|
EID: 84870320398
PISSN: 07378831
EISSN: None
Source Type: Journal
DOI: 10.1108/07378839710307331 Document Type: Article |
Times cited : (2)
|
References (3)
|