![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
Author: hunter P.
Publisher: Elsevier
ISSN: 1353-4858
Source: Network Security, Vol.2004, Iss.1, 2004-01, pp. : 17-19
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
EDI Security Issues Can Be Overcome
By Hains David
Information Management & Computer Security, Vol. 2, Iss. 3, 1994-03 ,pp. :
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
Security issues in Online Distance Learning
VINE, Vol. 31, Iss. 2, 2001-06 ,pp. :