Open Access
Subscription Access
E-Security
Almost everyday we hear that the system run by the government and private organizations have been penetrated or hacked. Even U.S. Military system and Microsoft organization have been hacked or defaced. As we become increasingly reliant upon information technology and communication technology, the exploitation by cyber-criminals poses an ever-greater threat to the public infrastructure.
User
Font Size
Information
Abstract Views: 318
PDF Views: 152