The SCEAS System
Navigation Menu

Journals in DBLP

Inf. Manag. Comput. Security
1998, volume: 6, number: 5

  1. Susan Cramm, Thornton May
    Accelerating executive development: hey coach ... [Citation Graph (0, 0)][DBLP]
    Inf. Manag. Comput. Security, 1998, v:6, n:5, pp:196-198 [Journal]
  2. Douglas Brockway, Margaret A. Hurley
    Achieving IT success. [Citation Graph (0, 0)][DBLP]
    Inf. Manag. Comput. Security, 1998, v:6, n:5, pp:199-204 [Journal]
  3. Victor Portougal, Lech J. Janczewski
    Industrial information-weight security models. [Citation Graph (0, 0)][DBLP]
    Inf. Manag. Comput. Security, 1998, v:6, n:5, pp:205-211 [Journal]
  4. Les Labuschagne, Jan H. P. Eloff
    Real-time risk analysis using Java concepts. [Citation Graph (0, 0)][DBLP]
    Inf. Manag. Comput. Security, 1998, v:6, n:5, pp:212-217 [Journal]
  5. Stephen Wilson
    Some limitations of web of trust models. [Citation Graph (0, 0)][DBLP]
    Inf. Manag. Comput. Security, 1998, v:6, n:5, pp:218-220 [Journal]
  6. Rossouw von Solms
    Information security management (2): guidelines to the management of information technology security (GMITS). [Citation Graph (0, 0)][DBLP]
    Inf. Manag. Comput. Security, 1998, v:6, n:5, pp:221-223 [Journal]
  7. Rossouw von Solms
    Information security management (3): the Code of Practice for Information Security Management (BS 7799). [Citation Graph (0, 0)][DBLP]
    Inf. Manag. Comput. Security, 1998, v:6, n:5, pp:224-225 [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002