Update search
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
NARROW
Format
Journal
Type
Date
Availability
1-4 of 4
Joseph S. Sherif
Close
Follow your search
Access your saved searches in your account
Would you like to receive an alert when new items match your search?
Sort by
Journal Articles
Strategies for successful CRM implementation
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (2007) 15 (2): 102–115.
Published: 01 May 2007
Journal Articles
Intrusion detection: methods and systems. Part II
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (2003) 11 (5): 222–229.
Published: 01 December 2003
Journal Articles
Intrusion detection: the art and the practice. Part I
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (2003) 11 (4): 175–186.
Published: 01 October 2003
Journal Articles
Deployment of anti‐virus software: a case study
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (2003) 11 (1): 5–10.
Published: 01 March 2003
