http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
Cangemi, M. INFORMATION SYSTEMS AUDIT AND CONTROL ASSOCIATION 2002 p.5-8
Intrusion Signatures and Analysis
Jelleyman, A. INFORMATION SYSTEMS AUDIT AND CONTROL ASSOCIATION 2002 p.9-10
Ross, S. J. INFORMATION SYSTEMS AUDIT AND CONTROL ASSOCIATION 2002 p.11-12
unknown INFORMATION SYSTEMS AUDIT AND CONTROL ASSOCIATION 2002 p.13-14
Capozzi, M.; Singleton, J. INFORMATION SYSTEMS AUDIT AND CONTROL ASSOCIATION 2002 p.15-19
Sayana, S. A. INFORMATION SYSTEMS AUDIT AND CONTROL ASSOCIATION 2002 p.20-22
The Y2K Bug-A Vaccine Against Terror Attacks?
Paliotta, A. R. INFORMATION SYSTEMS AUDIT AND CONTROL ASSOCIATION 2002 p.23-27
Business Continuity: A Business Survival Strategy
Doughty, K. INFORMATION SYSTEMS AUDIT AND CONTROL ASSOCIATION 2002 p.28-36
New Basel Accord: Operational Risk Management-Emerging Frontiers for the Profession
Bhatia, M. INFORMATION SYSTEMS AUDIT AND CONTROL ASSOCIATION 2002 p.37-43
Insuring Information Security: Commercial Insurance as an Information Security Driver
Pollitt, M. M. INFORMATION SYSTEMS AUDIT AND CONTROL ASSOCIATION 2002 p.44-48