Author: Mollerhaug S.
Publisher: Elsevier
ISSN: 1363-4127
Source: Information Security Technical Report, Vol.8, Iss.4, 2003-04, pp. : 78-84
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content
By Kamareddine F. Nederpelt R.
Theoretical Computer Science, Vol. 155, Iss. 1, 1996-02 ,pp. :
Improving the Vulnerability Management Process
By Merrell Samuel Stevens James
EDPACS, Vol. 38, Iss. 1, 2008-07 ,pp. :