Works matching DE "PREVENTION of computer hacking"
1
- ISSA Journal, 2019, v. 17, n. 1, p. 6
- Article
2
- Financial Executive, 2012, v. 28, n. 4, p. 8
- Article
3
- Financial Executive, 2003, v. 19, n. 9, p. 51
- Article
4
- Financial Executive, 2003, v. 19, n. 9, p. 49
- Article
5
- Financial Executive, 1997, v. 13, n. 2, p. 47
- Article
6
- Access (10300155), 2016, v. 30, n. 4, p. 3
- Article
7
- Social Science Computer Review, 2011, v. 29, n. 3, p. 369, doi. 10.1177/0894439310382519
- Barnett, George A.;
- Chung Joo Chung;
- Han Woo Park
- Article
8
- Journal of Counterterrorism & Homeland Security International, 2022, v. 27, n. 4, p. 8
- Article
9
- Journal of Counterterrorism & Homeland Security International, 2016, v. 22, n. 1, p. 8
- Article
10
- Electronics Letters (Wiley-Blackwell), 2019, v. 55, n. 9, p. 540, doi. 10.1049/el.2019.0022
- Article
11
- Internal Auditor, 2016, v. 73, n. 4, p. 18
- Article
12
- Information Technology & Management, 2021, v. 22, n. 4, p. 231, doi. 10.1007/s10799-020-00319-z
- Mishra, Birendra;
- Smirnova, Inna
- Article
13
- Vanderbilt Journal of Entertainment & Technology Law, 2018, v. 21, n. 1, p. 309
- Article
14
- Florida Bar Journal, 2016, v. 90, n. 7, p. 8
- Article
15
- Rutgers Computer & Technology Law Journal, 2016, v. 42, n. 1, p. 120
- Article
16
- Berkeley Technology Law Journal, 2011, v. 26, n. 1, p. 905
- Article
17
- Contract Management, 2015, v. 55, n. 8, p. 58
- Article
18
- Journal of Financial Planning, 2015, v. 28, n. 5, p. 24
- Article
19
- Journal of Financial Planning, 2012, v. 25, n. 3, p. 42
- Article
20
- Nature, 2010, v. 463, n. 7278, p. 136, doi. 10.1038/463136a
- Article
21
- International Journal of System & Software Engineering, 2015, v. 3, n. 2, p. 10, doi. 10.21863/ijsse/2015.3.2.006
- Kapse, Dinesh S.;
- Bagdi, Vijay
- Article
22
- Case Western Reserve Law Review, 2015, v. 65, n. 3, p. 861
- Article
23
- Journal of Corporate Accounting & Finance (Wiley), 2008, v. 19, n. 5, p. 3, doi. 10.1002/jcaf.20411
- Burnett, Royce D.;
- Daniels, Bobbie W.;
- Freidel, Alan;
- Friedman, Mark
- Article
24
- Asia Weekly, 2008, v. 2, n. 37, p. 14
- Article
25
- UMKC Law Review, 2014, v. 82, n. 4, p. 951
- Article
26
- Jurimetrics: The Journal of Law, Science & Technology, 2013, v. 53, n. 4, p. 447
- Article
27
- Cardozo Arts & Entertainment Law Journal, 2016, v. 34, n. 1, p. 281
- Article
28
- Distributed Computing, 2017, v. 30, n. 2, p. 103, doi. 10.1007/s00446-016-0280-0
- Gilbert, Seth;
- Newport, Calvin;
- Zheng, Chaodong
- Article
29
- MIS Quarterly, 2022, v. 46, n. 2, p. 1209, doi. 10.25300/MISQ/2022/16618
- Ebrahimi, Mohammadreza;
- Yidong Chai;
- Samtani, Sagar;
- Hsinchun Chen
- Article
30
- MIS Quarterly, 1992, v. 16, n. 2, p. 173, doi. 10.2307/249574
- Loch, Karen D.;
- Carr, Houston H.;
- Warkentin, Merrill E.
- Article
31
- Journal of the Association for Information Systems, 2010, v. 11, n. 7, p. 394
- Huigang Liang;
- Yajiong Xue
- Article
32
- Journal of Management Information Systems, 2012, v. 28, n. 4, p. 305, doi. 10.2753/MIS0742-1222280411
- Temizkan, Orcun;
- Kumar, Ram L.;
- Park, SungJune;
- Subramaniam, Chandrasekar
- Article
33
- Strategic Studies Quarterly, 2012, v. 6, n. 4, p. 100
- Article
34
- Strategic Studies Quarterly, 2012, v. 6, n. 4, p. 10
- Article
35
- Information Security Journal: A Global Perspective, 2012, v. 21, n. 4, p. 169, doi. 10.1080/19393555.2011.629340
- Akram, Syed;
- Misbahuddin, Mohammed;
- Varaprasad, G.
- Article
36
- Information Security Journal: A Global Perspective, 2010, v. 19, n. 4, p. 213, doi. 10.1080/19393551003762223
- Vijayaraghavan, V.;
- Paul, Sanjoy;
- Rajarathnam, N.
- Article
37
- Information Security Journal: A Global Perspective, 2008, v. 17, n. 4, p. 164, doi. 10.1080/19393550802369792
- Utin, DaniilM.;
- Utin, MikhailA.;
- Utin, Jane
- Article
38
- Strategic Finance, 2005, v. 86, n. 11, p. 55
- Article
39
- Strategic Finance, 2005, v. 86, n. 9, p. 31
- Article
40
- Strategic Finance, 1999, v. 81, n. 5, p. 38
- Article
41
- Victims & Offenders, 2016, v. 11, n. 4, p. 534, doi. 10.1080/15564886.2015.1121944
- Chua, Yi Ting;
- Holt, Thomas J.
- Article
42
- Strategic Finance, 2017, v. 99, n. 4, p. 62
- ROHRER, KARTER K.;
- HOM, NATHANIEL S.
- Article
43
- Temple International & Comparative Law Journal, 2016, v. 30, n. 2, p. 353
- Article
44
- Loyola of Los Angeles International & Comparative Law Review, 2023, v. 46, n. 1, p. 45
- Article
45
- Loss Prevention Bulletin, 2012, n. 224, p. 5
- Article
46
- Columbia Human Rights Law Review, 2015, v. 47, n. 1, p. 242
- Article
47
- Police Practice & Research, 2016, v. 17, n. 6, p. 507, doi. 10.1080/15614263.2016.1205983
- Tomblin, Jordon;
- Jenion, Greg
- Article
48
- Contemporary Physics, 2016, v. 57, n. 3, p. 366, doi. 10.1080/00107514.2016.1148333
- Jain, Nitin;
- Stiller, Birgit;
- Khan, Imran;
- Elser, Dominique;
- Marquardt, Christoph;
- Leuchs, Gerd
- Article
49
- International Journal of Network Management, 2016, v. 26, n. 3, p. 156, doi. 10.1002/nem.1923
- Jiang, Ci‐Bin;
- Liu, I‐Hsien;
- Chung, Yao‐Nien;
- Li, Jung‐Shian
- Article
50
- Security & Communication Networks, 2016, v. 9, n. 13, p. 2222, doi. 10.1002/sec.1472
- Bhandari, Abhinav;
- Sangal, Amrit Lal;
- Kumar, Krishan
- Article