Showing 1 - 2 of 2
1. Attacks on IT systems: categories of motives / Georg Disterer -- 2. Wireless security / Faisal Kaleem and Kang K. Yen -- 3. Analysis, development and deployment of statistical anomaly detection techniques for real e-mail traffic / Gianluca Papaleo ... [et al.] -- 4. Forensics challenges for...
Persistent link: https://www.econbiz.de/10011727254
"This book offers research on the economic, social, and environmental objectives essential to the planning and support of future organizations and communities for those interested in designing business models and financial plans with consideration for environmental and social...
Persistent link: https://www.econbiz.de/10011728307