![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
Author: Liddy Carrie
Publisher: Emerald Group Publishing Ltd
ISSN: 0968-5227
Source: Information Management & Computer Security, Vol.4, Iss.1, 1996-01, pp. : 47-49
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
Information security and the Internet
Information Management & Computer Security, Vol. 3, Iss. 4, 1995-04 ,pp. :
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)