BACIVAROV, I. (2014). Nine Decades of Modern Quality. Walter A. Shewhart – A Pioneer and Visionary of Quality. International Journal of Information Security and Cybercrime, 3(1), 9-16. Retrieve from https://www.ijisc.comBACIVAROV, I., 2014. Nine Decades of Modern Quality. Walter A. Shewhart – A Pioneer and Visionary of Quality. International Journal of Information Security and Cybercrime 3(1), 9-16. Available from: https://www.ijisc.comI. BACIVAROV, "Nine Decades of Modern Quality. Walter A. Shewhart – A Pioneer and Visionary of Quality," International Journal of Information Security and Cybercrime, vol. 3, no. 1, pp. 9-16, 2014. Available: https://www.ijisc.comBACIVAROV, I., 'Nine Decades of Modern Quality. Walter A. Shewhart – A Pioneer and Visionary of Quality', International Journal of Information Security and Cybercrime, vol. 3, no. 1, 9-16, (2014).BACIVAROV, I.: Nine Decades of Modern Quality. Walter A. Shewhart – A Pioneer and Visionary of Quality. International Journal of Information Security and Cybercrime 3 (2014) 9-16. https://www.ijisc.comBACIVAROV, I., (2014), Nine Decades of Modern Quality. Walter A. Shewhart – A Pioneer and Visionary of Quality. International Journal of Information Security and Cybercrime, 3: 9-16. https://www.ijisc.com Citation Format :
SINGH, P.K.,SANGWAN, O.P.,PRATAP, A.,SINGH, A.P., (2014). An Analysis on Software Testability and Security in Context of Object and Aspect Oriented Software Development. International Journal of Information Security and Cybercrime, 3(1), 17-28. Retrieve from https://www.ijisc.comSINGH, P.K., SANGWAN, O.P., PRATAP, A., SINGH, A.P., 2014. An Analysis on Software Testability and Security in Context of Object and Aspect Oriented Software Development. International Journal of Information Security and Cybercrime 3(1), 17-28. Available from: https://www.ijisc.comP.K. SINGH, O.P. SANGWAN, A. PRATAP, A.P. SINGH, "An Analysis on Software Testability and Security in Context of Object and Aspect Oriented Software Development," International Journal of Information Security and Cybercrime, vol. 3, no. 1, pp. 17-28, 2014. Available: https://www.ijisc.comSINGH, P.K., SANGWAN, O.P., PRATAP, A., SINGH, A.P., 'An Analysis on Software Testability and Security in Context of Object and Aspect Oriented Software Development', International Journal of Information Security and Cybercrime, vol. 3, no. 1, 17-28, (2014).SINGH, P.K.,SANGWAN, O.P.,PRATAP, A.,SINGH, A.P.,: An Analysis on Software Testability and Security in Context of Object and Aspect Oriented Software Development. International Journal of Information Security and Cybercrime 3 (2014) 17-28. https://www.ijisc.comSINGH, P.K., SANGWAN, O.P., PRATAP, A., SINGH, A.P., (2014), An Analysis on Software Testability and Security in Context of Object and Aspect Oriented Software Development. International Journal of Information Security and Cybercrime, 3: 17-28. https://www.ijisc.com Citation Format :
BARBU, I.D.,PASCARIU, C., (2014). Information Security Analyst Profile. International Journal of Information Security and Cybercrime, 3(1), 29-36. Retrieve from https://www.ijisc.comBARBU, I.D., PASCARIU, C., 2014. Information Security Analyst Profile. International Journal of Information Security and Cybercrime 3(1), 29-36. Available from: https://www.ijisc.comI.D. BARBU, C. PASCARIU, "Information Security Analyst Profile," International Journal of Information Security and Cybercrime, vol. 3, no. 1, pp. 29-36, 2014. Available: https://www.ijisc.comBARBU, I.D., PASCARIU, C., 'Information Security Analyst Profile', International Journal of Information Security and Cybercrime, vol. 3, no. 1, 29-36, (2014).BARBU, I.D.,PASCARIU, C.,: Information Security Analyst Profile. International Journal of Information Security and Cybercrime 3 (2014) 29-36. https://www.ijisc.comBARBU, I.D., PASCARIU, C., (2014), Information Security Analyst Profile. International Journal of Information Security and Cybercrime, 3: 29-36. https://www.ijisc.com Citation Format :
GHERGHINA, C.,PETRICĂ, G., (2014). Wireless LAN Security Issues (II). Security Assurance. International Journal of Information Security and Cybercrime, 3(1), 37-46. Retrieve from https://www.ijisc.comGHERGHINA, C., PETRICĂ, G., 2014. Wireless LAN Security Issues (II). Security Assurance. International Journal of Information Security and Cybercrime 3(1), 37-46. Available from: https://www.ijisc.comC. GHERGHINA, G. PETRICĂ, "Wireless LAN Security Issues (II). Security Assurance," International Journal of Information Security and Cybercrime, vol. 3, no. 1, pp. 37-46, 2014. Available: https://www.ijisc.comGHERGHINA, C., PETRICĂ, G., 'Wireless LAN Security Issues (II). Security Assurance', International Journal of Information Security and Cybercrime, vol. 3, no. 1, 37-46, (2014).GHERGHINA, C.,PETRICĂ, G.,: Wireless LAN Security Issues (II). Security Assurance. International Journal of Information Security and Cybercrime 3 (2014) 37-46. https://www.ijisc.comGHERGHINA, C., PETRICĂ, G., (2014), Wireless LAN Security Issues (II). Security Assurance. International Journal of Information Security and Cybercrime, 3: 37-46. https://www.ijisc.com Citation Format :
MARIN, R.I. (2014). An Analysis of the Cybercrime Phenomenon. Damages Caused by Cyber-Attacks. International Journal of Information Security and Cybercrime, 3(1), 47-52. Retrieve from https://www.ijisc.comMARIN, R.I., 2014. An Analysis of the Cybercrime Phenomenon. Damages Caused by Cyber-Attacks. International Journal of Information Security and Cybercrime 3(1), 47-52. Available from: https://www.ijisc.comR.I. MARIN, "An Analysis of the Cybercrime Phenomenon. Damages Caused by Cyber-Attacks," International Journal of Information Security and Cybercrime, vol. 3, no. 1, pp. 47-52, 2014. Available: https://www.ijisc.comMARIN, R.I., 'An Analysis of the Cybercrime Phenomenon. Damages Caused by Cyber-Attacks', International Journal of Information Security and Cybercrime, vol. 3, no. 1, 47-52, (2014).MARIN, R.I.: An Analysis of the Cybercrime Phenomenon. Damages Caused by Cyber-Attacks. International Journal of Information Security and Cybercrime 3 (2014) 47-52. https://www.ijisc.comMARIN, R.I., (2014), An Analysis of the Cybercrime Phenomenon. Damages Caused by Cyber-Attacks. International Journal of Information Security and Cybercrime, 3: 47-52. https://www.ijisc.com Citation Format :
BASAMAC, L. (2014). Computer Frauds. International Journal of Information Security and Cybercrime, 3(1), 53-58. Retrieve from https://www.ijisc.comBASAMAC, L., 2014. Computer Frauds. International Journal of Information Security and Cybercrime 3(1), 53-58. Available from: https://www.ijisc.comL. BASAMAC, "Computer Frauds," International Journal of Information Security and Cybercrime, vol. 3, no. 1, pp. 53-58, 2014. Available: https://www.ijisc.comBASAMAC, L., 'Computer Frauds', International Journal of Information Security and Cybercrime, vol. 3, no. 1, 53-58, (2014).BASAMAC, L.: Computer Frauds. International Journal of Information Security and Cybercrime 3 (2014) 53-58. https://www.ijisc.comBASAMAC, L., (2014), Computer Frauds. International Journal of Information Security and Cybercrime, 3: 53-58. https://www.ijisc.com Citation Format :
PRIPAS, M.I. (2014). Phishing Attack – Detection and Removal. International Journal of Information Security and Cybercrime, 3(1), 59-64. Retrieve from https://www.ijisc.comPRIPAS, M.I., 2014. Phishing Attack – Detection and Removal. International Journal of Information Security and Cybercrime 3(1), 59-64. Available from: https://www.ijisc.comM.I. PRIPAS, "Phishing Attack – Detection and Removal," International Journal of Information Security and Cybercrime, vol. 3, no. 1, pp. 59-64, 2014. Available: https://www.ijisc.comPRIPAS, M.I., 'Phishing Attack – Detection and Removal', International Journal of Information Security and Cybercrime, vol. 3, no. 1, 59-64, (2014).PRIPAS, M.I.: Phishing Attack – Detection and Removal. International Journal of Information Security and Cybercrime 3 (2014) 59-64. https://www.ijisc.comPRIPAS, M.I., (2014), Phishing Attack – Detection and Removal. International Journal of Information Security and Cybercrime, 3: 59-64. https://www.ijisc.com Citation Format :