Security mechanism in computer network environment: A study of adoption status in Malaysian company
暂无分享,去创建一个
[1] Steven Furnell,et al. Security analysers: administrator assistants or hacker helpers? , 2001, Inf. Manag. Comput. Secur..
[2] R. Power. CSI/FBI computer crime and security survey , 2001 .
[3] Patrick W. Dowd,et al. Network Security: It's Time to Take It Seriously (Guest Editors' Introduction) , 1998, Computer.
[4] Janice C. Sipior,et al. User perceptions of software with embedded spyware , 2007, J. Enterp. Inf. Manag..
[5] Alain Yee-Loong Chong,et al. Collaborative Commerce in Supply Chain Management: A study of Adoption Status in Malaysian Electrical and Electronic Industry , 2008 .
[6] Andrew Stewart. Information security technologies as a commodity input , 2005, Inf. Manag. Comput. Security.
[7] Fred Cohen,et al. Feature: Managing network security: Simulating network security , 1999 .
[8] William J. Caelli. Security in Open and Distributed Systems , 1994, Inf. Manag. Comput. Secur..
[9] Marilyn M. Helms,et al. Shielding your company against information compromise , 2000, Inf. Manag. Comput. Secur..
[10] Farrokh Mamaghani,et al. Evaluation and selection of an antivirus and content filtering software , 2002, Inf. Manag. Comput. Secur..
[11] Karen A. Forcht,et al. Security and Network Management: Changes in the Way We Work , 1994, Inf. Manag. Comput. Secur..