E-resources
Peer reviewed
-
Rutherford, Robert
Computer fraud & security, 11/2018, Volume: 2018, Issue: 11Journal Article
Using cyber attacks to steal sensitive information from businesses is nothing new. In fact, building and updating defences against data breaches is a standard requirement for IT departments around the world. However, as the methods of cyber criminals grow more sophisticated and persistent, the number of businesses being targeted is on the rise, with three quarters of organisations hit by phishing attacks in 2017.1
Author
![loading ... loading ...](themes/default/img/ajax-loading.gif)
Shelf entry
Permalink
- URL:
Impact factor
Access to the JCR database is permitted only to users from Slovenia. Your current IP address is not on the list of IP addresses with access permission, and authentication with the relevant AAI accout is required.
Year | Impact factor | Edition | Category | Classification | ||||
---|---|---|---|---|---|---|---|---|
JCR | SNIP | JCR | SNIP | JCR | SNIP | JCR | SNIP |
Select the library membership card:
If the library membership card is not in the list,
add a new one.
DRS, in which the journal is indexed
Database name | Field | Year |
---|
Links to authors' personal bibliographies | Links to information on researchers in the SICRIS system |
---|
Source: Personal bibliographies
and: SICRIS
The material is available in full text. If you wish to order the material anyway, click the Continue button.