![]() |
Volumn 16, Issue 5, 2014, Pages 9-11
|
Securing bYOD
|
Author keywords
BYOD; cybercrime; information technology; Internet Web technologies; IT; mobile; project management; security
|
Indexed keywords
INFORMATION TECHNOLOGY;
SECURITY SYSTEMS;
BYOD;
CYBERCRIME;
MOBILE;
PERSONAL DEVICES;
PROPRIETARY INFORMATION;
SECURITY;
SECURITY POLICY;
SECURITY THREATS;
PROJECT MANAGEMENT;
|
EID: 84907551133
PISSN: 15209202
EISSN: None
Source Type: Journal
DOI: 10.1109/MITP.2014.76 Document Type: Article |
Times cited : (18)
|
References (8)
|