Information Warfare
Databases are always the main target of attackers because they contain the critical data of organizations. Although prevention techniques are available, the history of system break-ins guarantees that there is no foolproof technique that totally eliminates security loopholes in a computer system. He...
Saved in:
| Main Author: | |
|---|---|
| Other Authors: | , |
| Format: | conferenceObject |
| Published: |
2015
|
| Subjects: | |
| Online Access: | http://hdl.handle.net/10725/7117 http://dx.doi.org/10.1109/SSCI.2015.73 http://libraries.lau.edu.lb/research/laur/terms-of-use/articles.php http://ieeexplore.ieee.org/abstract/document/7376646/ |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|