|
Journals in DBLP
- Fritz H. Grupe, James M. Hensley, Jeanne H. Yamamura
Watching systems in action: security at the periphery. [Citation Graph (0, 0)][DBLP] Inf. Manag. Comput. Security, 1998, v:6, n:4, pp:155-159 [Journal]
- Margaret A. Hurley
Features and functions overload. [Citation Graph (0, 0)][DBLP] Inf. Manag. Comput. Security, 1998, v:6, n:4, pp:160-161 [Journal]
- Pauline Ratnasingham
Trust in Web-based electronic commerce security. [Citation Graph (0, 0)][DBLP] Inf. Manag. Comput. Security, 1998, v:6, n:4, pp:162-166 [Journal]
- M. E. Thomson, Rossouw von Solms
Information security awareness: educating your users effectively. [Citation Graph (0, 0)][DBLP] Inf. Manag. Comput. Security, 1998, v:6, n:4, pp:167-173 [Journal]
- Rossouw von Solms
Information security management (1): why information security is so important. [Citation Graph (0, 0)][DBLP] Inf. Manag. Comput. Security, 1998, v:6, n:4, pp:174-177 [Journal]
- H. Joseph Wen, Jyh-Horng Michael Tarn
Internet security: a case study of firewall selection. [Citation Graph (0, 0)][DBLP] Inf. Manag. Comput. Security, 1998, v:6, n:4, pp:178-184 [Journal]
|