The SCEAS System
Navigation Menu

Journals in DBLP

Inf. Manag. Comput. Security
1997, volume: 5, number: 3

  1. Carrie Liddy
    Commercialization of cryptography. [Citation Graph (0, 0)][DBLP]
    Inf. Manag. Comput. Security, 1997, v:5, n:3, pp:87-89 [Journal]
  2. Thornton May
    The death of ROI: re-thinking IT value measurement. [Citation Graph (0, 0)][DBLP]
    Inf. Manag. Comput. Security, 1997, v:5, n:3, pp:90-92 [Journal]
  3. Zeinab A. Karake
    Managing information resources and environmental turbulence. [Citation Graph (0, 0)][DBLP]
    Inf. Manag. Comput. Security, 1997, v:5, n:3, pp:93-99 [Journal]
  4. Charles Cresson Wood
    Securely handling staff terminations. [Citation Graph (0, 0)][DBLP]
    Inf. Manag. Comput. Security, 1997, v:5, n:3, pp:100-101 [Journal]
  5. Schubert Foo, Peng-Chor Leong, Yee Nam Sng
    Improving security in computational electronic mail systems. [Citation Graph (0, 0)][DBLP]
    Inf. Manag. Comput. Security, 1997, v:5, n:3, pp:102-110 [Journal]
  6. Steve Orlowski
    Government initiatives in information technology security. [Citation Graph (0, 0)][DBLP]
    Inf. Manag. Comput. Security, 1997, v:5, n:3, pp:111-118 [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002