Login / Signup
Application Security - Myth Or Reality?
William J. Caelli
Published in:
ISPEC (2007)
Keyphrases
</>
access control
information security
key technologies
database
real world
social networks
case study
power system
security requirements
key management
information assurance