![](/images/ico/ico_close.png)
![](/images/ico/ico3.png)
Period of time: 2013年4期
Publisher: Emerald Group Publishing Ltd
Founded in: 1993
Total resources: 95
ISSN: 0968-5227
Subject: TP Automation Technology , Computer Technology
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Information Management & Computer Security,volume 13,issue 4
Menu
![](/images/ico/ico5.png)
An XML-based architecture for data integration in vulnerability assessments
By Blyth Andrew,Thomas Paula in (2005)
Information Management & Computer Security,volume 13,issue 4 , Vol. 13, Iss. 4, 2005-09 , pp.![](/images/ico/ico5.png)
Data mining as a technique for knowledge management in business process redesign
By Folorunso O.,Ogunde A.O. in (2005)
Information Management & Computer Security,volume 13,issue 4 , Vol. 13, Iss. 4, 2005-09 , pp.![](/images/ico/ico5.png)
Conceptualizing strategic issues in information technology outsourcing
By Pati Niranjan,Desai Mayur S. in (2005)
Information Management & Computer Security,volume 13,issue 4 , Vol. 13, Iss. 4, 2005-09 , pp.![](/images/ico/ico5.png)
Information systems security issues and decisions for small businesses: An empirical examination
By Gupta Atul,Hammond Rex in (2005)
Information Management & Computer Security,volume 13,issue 4 , Vol. 13, Iss. 4, 2005-09 , pp.![](/images/ico/ico5.png)
What ERP systems can tell us about Sarbanes-Oxley
By Brown William,Nasuti Frank in (2005)
Information Management & Computer Security,volume 13,issue 4 , Vol. 13, Iss. 4, 2005-09 , pp.![](/images/ico/ico5.png)
Dynamic content attacks on digital signatures
By Alsaid Adil,Mitchell Chris J. in (2005)
Information Management & Computer Security,volume 13,issue 4 , Vol. 13, Iss. 4, 2005-09 , pp.