Information Warfare

Databases are always the main target of attackers because they contain the critical data of organizations. Although prevention techniques are available, the history of system break-ins guarantees that there is no foolproof technique that totally eliminates security loopholes in a computer system. He...

Full description

Saved in:
Bibliographic Details
Main Author: Haraty, Ramzi A. (author)
Other Authors: Kaddoura, Sanaa (author), Zekri, Ahmed (author)
Format: conferenceObject
Published: 2015
Subjects:
Online Access:http://hdl.handle.net/10725/7117
http://dx.doi.org/10.1109/SSCI.2015.73
http://libraries.lau.edu.lb/research/laur/terms-of-use/articles.php
http://ieeexplore.ieee.org/abstract/document/7376646/
Tags: Add Tag
No Tags, Be the first to tag this record!