Author:
Al-Shiha Reem,Alghowinem Sharifa
Publisher
Springer International Publishing
Reference26 articles.
1. Dewanjee, R., Vyas, R.: Cyber crime: critical view. Int. J. Sci. Res. (IJSR) 5(1), 85–87 (2016). https://doi.org/10.21275%2Fv5i1.nov152579
2. Bayuk, J.L., Healey, J., Rohmeyer, P., Sachs, M.H., Schmidt, J., Weiss, J.: Cyber Security Policy Guidebook. John Wiley & Sons, Inc. (2012). https://doi.org/10.1002%2F9781118241530
3. Hansen, L., Nissenbaum, H.: Digital disaster, cyber security, and the copenhagen school. Int. Stud. Q. 53(4), 155–1175 (2009). https://doi.org/10.1111%2Fj.1468-2478.2009.00572.x
4. Sheoran, P., Singh, S.: Applications of ethical hacking. Int. J. Enhanc. Res. Sci. Technol. Eng. 3(5), 112–114 (2014)
5. Farsole, A.A., Kashikar, A.G., Zunzunwala, A.: Ethical hacking. Int. J. Comput. Appl. 1(10), 14–20 (2010). https://doi.org/10.5120%2F229-380
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献