Three Obscure Things in Our Field that I Actually SUPPORT!!Published in:Information Systems Management, 2010, v. 27, n. 1, p. 96, doi. 10.1080/10580530903455353By:Glass, RobertL.Publication type:Article
Lockheed Martin Partnering to Reduce Cyber Security Vulnerabilities.Published in:Homeland Defense Journal, 2008, v. 6, n. 4, p. 50Publication type:Article
Fighting Cyber-Crime.Published in:Government Technology, 2009, v. 22, n. 4, p. 42By:TOWNS, STEVEPublication type:Article
The Chinese spy chip scandal and supply chain security.Published in:Bench & Bar of Minnesota, 2018, v. 75, n. 11, p. 5By:LANTERMAN, MARKPublication type:Article
Cybersecurity: How safe are your data?Published in:Nature, 2010, v. 464, n. 7293, p. 1260, doi. 10.1038/4641260aBy:Perkel, JeffreyPublication type:Article