메뉴 건너뛰기




Volumn 15, Issue 1-2, 1997, Pages 92-95

After the break-in occurs: How to handle the student hacker

Author keywords

Alabama University; Computer security; Hacking; Policy; Students

Indexed keywords


EID: 84870320398     PISSN: 07378831     EISSN: None     Source Type: Journal    
DOI: 10.1108/07378839710307331     Document Type: Article
Times cited : (2)

References (3)
  • 2
    • 77950079402 scopus 로고
    • An Essay on the Openness of Networks, Electronic Free Speech, and the Security of Computers
    • November
    • Steve Cisler, “An Essay on the Openness of Networks, Electronic Free Speech, and the Security of Computers,” OnLine 14:6 (November 1990): 101-104.
    • (1990) OnLine , vol.14 , Issue.6 , pp. 101-104
    • Cisler, S.1
  • 3
    • 84886436832 scopus 로고    scopus 로고
    • The University of Wisconsin at Madison Is Seeking a Full-Time Investigator to Track Down Evildoers on Its Computer Network
    • 7 June
    • “The University of Wisconsin at Madison Is Seeking a Full-Time Investigator to Track Down Evildoers on Its Computer Network,” The Chronicle of Higher Education 42:39 (7 June 1996): A19.
    • (1996) The Chronicle of Higher Education , vol.42 , Issue.39 , pp. A19


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.