Author: Burke Jane Regazzi John
Publisher: The Charleston Company
ISSN: 1525-4003
Source: The Charleston Advisor, Vol.2, Iss.2, 2000-10, pp. : 53-53
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content
Malware Attacks: Why, When and How?
SourceOECD Science & Information Technology, Vol. 2009, Iss. 2, 2009-02 ,pp. :
Malware: Why Should We Be Concerned?
SourceOECD Science & Information Technology, Vol. 2009, Iss. 2, 2009-02 ,pp. :
Why don’t they practice what we preach?
Annals of Software Engineering, Vol. 6, Iss. 1-4, 1998-01 ,pp. :