Information Systems Security Management

  • Alsmadi I
N/ACitations
Citations of this article
16Readers
Mendeley users who have this article in their library.
Get full text

Abstract

… 2. Propagation method: How the virus moves from one victim machine or file to another … One technique is to ensure that file size goes back to its original size, despite the … attackers target webforms with malformed SQL queries to be able to access system backend databases …

Cite

CITATION STYLE

APA

Alsmadi, I. (2020). Information Systems Security Management. In The NICE Cyber Security Framework (pp. 31–53). Springer International Publishing. https://doi.org/10.1007/978-3-030-41987-5_2

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free