Author: Wolf H.J.A. (Rens) de Spruit Marcel E.M.
Publisher: Emerald Group Publishing Ltd
ISSN: 0968-5227
Source: Information Management & Computer Security, Vol.11, Iss.3, 2003-08, pp. : 123-129
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content
Stealth malware analysis from kernel space with Kolumbo
Journal in Computer Virology, Vol. 7, Iss. 1, 2011-02 ,pp. :
Stealth KM: how to make KM successful in any organization
VINE, Vol. 36, Iss. 1, 2006-01 ,pp. :
International Journal of Systems and Service-Oriented Engineering (IJSSOE), Vol. 2, Iss. 2, 2011-04 ,pp. :