Author:
Muzaffar Hussain Mohammed,Sharique Ahmed A.,Ahmed Madar Shariq,Suhail Ahmed K. A.
Reference33 articles.
1. From information security to cyber security
2. Network Security Basics
3. Yoder, Joseph, and Jeffrey Barcalow. “Architectural patterns for enabling application security.” Proceedings of the 4th Conference on Patterns Language of Programming (PLoP’97). Vol. 2. 1997.
4. Whitman, Michael E., and Herbert J. Mattord. Principles of information security. Cengage Learning, 2011.
5. Dacier, Marc, Yves Deswarte, and Mohamed Kaâniche. “Quantitative assessment of operational security: Model sand tools.” Information Systems Security, ed. by SK Katsikas and D. Gritzalis, London, Chapman & Hall (1996): 179–86.