Author: Jorgensen M.
Publisher: Elsevier
ISSN: 0950-5849
Source: Information and Software Technology, Vol.46, Iss.1, 2004-01, pp. : 3-16
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content
''Top-down'' versus ''Bottom-up'' - Different approaches to security
By Wilson P.
Network Security, Vol. 2003, Iss. 12, 2003-12 ,pp. :