

Author: Phelan Kelly Virginia Chen Hsiang-Ting Haney Matthew
Publisher: Emerald Group Publishing Ltd
ISSN: 1757-9880
Source: Journal of Hospitality and Tourism Technology, Vol.4, Iss.2, 2013-07, pp. : 134-154
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content










How to ensure an effective penetration test
By Midian P.
Information Security Technical Report, Vol. 8, Iss. 4, 2003-04 ,pp. :