Your Guide to Authenticating Mobile Devices.Published in:Journal of Corporate Accounting & Finance (Wiley), 2015, v. 26, n. 4, p. 65, doi. 10.1002/jcaf.22052By:Mooney, J. Lowell;Parham, Abbie Gail;Cairney, Timothy D.Publication type:Article
2013 Trends and Strategies.Published in:IT Professional, 2013, v. 15, n. 1, p. 64, doi. 10.1109/MITP.2013.5By:Costello, Tom;Prohaska, BeverlyPublication type:Article