IT Security: "Even Threats from inside must be averted"

被引:0
|
作者
不详
机构
来源
ATP EDITION | 2011年 / 04期
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
引用
收藏
页码:6 / 6
页数:1
相关论文
共 50 条
  • [21] Security Threats Ahead
    不详
    MECHANICAL ENGINEERING, 2011, 133 (12) : 16 - 16
  • [22] Water security and the threats from biological agents of concern
    Rose, Joan B.
    MANAGEMENT OF INTENTIONAL AND ACCIDENTAL WATER POLLUTION, 2006, 11 : 337 - +
  • [23] Protecting Teenagers from Potential Internet Security Threats
    Hamdan, Zainab
    Obaid, Iman
    Ali, Asma
    Hussain, Hanan
    Rajan, Amala V.
    Ahamed, Jinesh
    PROCEEDINGS OF THE 2013 INTERNATIONAL CONFERENCE ON CURRENT TRENDS IN INFORMATION TECHNOLOGY (CTIT), 2013, : 143 - 152
  • [24] Threats from farm animals to food and human security
    Chen, Bao-Ji
    Ho, Chung-Ping
    Huang, Nai-Yun
    ASIA PACIFIC JOURNAL OF CLINICAL NUTRITION, 2009, 18 (04) : 549 - 552
  • [25] On the provision of economic security of Russia from outside threats
    Petrov, V. V.
    LEGAL SCIENCE AND PRACTICE-BULLETIN OF NIZHNIY NOVGOROD ACADEMY OF THE MINISTRY IF THE INTERIOR OF RUSSIA, 2009, 11 (02): : 84 - 88
  • [26] Privacy and Security Threats from Smart Meters Technology
    Robinson, Matthew
    Schirmer, Pascal A.
    Mporas, Iosif
    2021 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST), 2021,
  • [27] From security to risk: reframing global health threats
    McInnes, Colin
    Roemer-Mahler, Anne
    INTERNATIONAL AFFAIRS, 2017, 93 (06) : 1313 - +
  • [28] Security Must Be Defended - Or, the Survival of Security
    Shah, Nisha
    SECURITY DIALOGUE, 2010, 41 (06) : 631 - 638
  • [29] Even guidelines must be allowed to be questioned
    Kulu, Y.
    Hackert, T.
    Debus, J.
    Weber, M. -A.
    Buechler, M. W.
    Ulrich, A.
    CHIRURG, 2016, 87 (10): : 886 - 888
  • [30] Even Rupert must become a memory
    Fletcher, Kim
    BRITISH JOURNALISM REVIEW, 2016, 27 (01) : 54 - 59