Login / Signup

Application Security - Myth Or Reality?

William J. Caelli
Published in: ISPEC (2007)
Keyphrases
  • access control
  • information security
  • key technologies
  • database
  • real world
  • social networks
  • case study
  • power system
  • security requirements
  • key management
  • information assurance