A Culture of Trust Threatens Security and Privacy in Qatar
暂无分享,去创建一个
[1] Brenda E. Bickett. Encyclopedia of Islam and the Muslim World , 2012 .
[2] Amir Herzberg,et al. Why Johnny can't surf (safely)? Attacks and defenses for web users , 2009, Comput. Secur..
[3] Marti A. Hearst,et al. Why phishing works , 2006, CHI.
[4] A. Emigh,et al. Online Identity Theft: Phishing Technology, Chokepoints and Countermeasures , 2005 .
[5] Reid Goldsborough. Don't Get "Phished" out of Cyberspace. , 2004 .
[6] Lauren Bielski,et al. Phishing Phace-Off: Online Fraudsters and Vendors Do Battle to Gain Control of Electronic Information. Meanwhile, Incidents Rise and Consumer Confidence Suffers , 2004 .
[7] Reid Goldsborough,et al. Fighting Back against Cyberstalking. , 2004 .
[8] Richard C. Martin,et al. Encyclopedia of Islam and the Muslim world , 2004 .