

Author: Bernardo Danilo Valeros
Publisher: Inderscience Publishers
ISSN: 1744-1765
Source: International Journal of Information and Computer Security, Vol.5, Iss.2, 2012-01, pp. : 77-104
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content




Positive Security, Risk Management, and Compliance
EDPACS, Vol. 47, Iss. 4, 2013-04 ,pp. :



