Login / Signup
Applying application security standards - a case study.
Stuart King
Published in:
Comput. Secur. (2004)
Keyphrases
</>
network connection
access control
intrusion detection
real time
real world
data mining
search engine
electronic commerce
privacy preserving
network security
security issues
computer security
security model
security systems
security properties
security threats