Book Review: Information Warfare and Security

被引:0
作者
机构
来源
| 2000年 / Idea Group Publ卷 / 12期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
[41]   A REVIEW ON ENTERPRISE INFORMATION SECURITY AND STANDARDS [J].
Vural, Yilmaz ;
Sagiroglu, Seref .
JOURNAL OF THE FACULTY OF ENGINEERING AND ARCHITECTURE OF GAZI UNIVERSITY, 2008, 23 (02) :507-522
[42]   Key technologies in information security - A review [J].
Athisha, G ;
Sankaranarayanan, K .
IETE TECHNICAL REVIEW, 2005, 22 (03) :173-181
[43]   Information Security Strategy: A Scoping Review [J].
Aigbefo, Queen A. ;
Blount, Yvette ;
Marrone, Mauricio .
PACIFIC ASIA CONFERENCE ON INFORMATION SYSTEMS - PACIS 2021, 2021,
[44]   Applications of trusted review to information security [J].
Yesberg, J ;
Henderson, M .
INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2001, 2119 :305-319
[45]   A Review on Gamification for Information Security Training [J].
Sharif, Karzan Hussein ;
Ameen, Siddeeq Yousif .
2021 INTERNATIONAL CONFERENCE OF MODERN TRENDS IN INFORMATION AND COMMUNICATION TECHNOLOGY INDUSTRY (MTICTI 2021), 2021, :123-130
[46]   Information security management: A bibliographic review [J].
Cardenas-Solano, Leidy-Johanna ;
Martinez-Ardila, Hugo ;
Becerra-Ardila, Luis-Eduardo .
PROFESIONAL DE LA INFORMACION, 2016, 25 (06) :931-948
[47]   Book Review: Access Denied in the Information Age [J].
Michael Margolis .
The Journal of Technology Transfer, 2002, 27 (3) :291-293
[49]   The state of security and warfare of demons [J].
Basu, A .
CRITICAL QUARTERLY, 2003, 45 (1-2) :11-32
[50]   Book review: managing internet information services [J].
Liu, Cricket ;
Peel, Jerry ;
Jones, Russ ;
Buus, Bryan ;
Nye, Adrian .
Journal of the American Society for Information Science, 1996, 47 (03)