Queuing Theory for Operations in Information Assurance.Published in:Norwich University Journal of Information Assurance (NUJIA), 2006, v. 2, n. 2, p. 1By:Yates, Christopher L.Publication type:Article
RFIE: Applications, Security and Privacy.Published in:2006By:Heald, Arian EigenPublication type:Book Review
Approaching Zero A Study in Zero-Day Exploits Origins, Cases, and Trends.Published in:Norwich University Journal of Information Assurance (NUJIA), 2006, v. 2, n. 2, p. 1By:Porter, BrycePublication type:Article