搜索历史记录选项已关闭,请开启搜索历史记录选项。
作者: Paul Rohmeyer
DOI: 10.1007/0-306-48638-5_12
关键词:
摘要: … Finally, governance activities may be described as oversight practices. Schneier [24] observed that in practice, “Digital security tends to rely wholly on prevention: cryptography, firewalls…
The Second International Conference on Informatics Engineering & Information Science (ICIEIS2013),2013, 引用: 2