Login / Signup
Securing BYOD.
J. Morris Chang
Pao-Chung Ho
Teng-Chang Chang
Published in:
IT Prof. (2014)
Keyphrases
</>
information security
database
artificial intelligence
data mining
databases
natural language
data analysis
human computer interaction
information systems
metadata
relational databases
data processing
case study
software development