共 27 条
[1]
Arthur C., 2011, The Guardian
[2]
Aytes K., 2004, Journal of Organizational and End User Computing, V16, P22, DOI 10.4018/joeuc.2004070102
[3]
Baker P., 2011, CIO UPDATE
[4]
Chickowski E., 2009, Baseline Magazine
[5]
Erlanger L., 2011, SMARTPHONE SECURITY
[6]
Felt A.P., 2011, P 1 ACM WORKSH SEC P, DOI DOI 10.1145/2046614.2046618
[7]
Georgia Tech Information Security Center, 2008, EM CYB THREATS REP 2
[8]
Gohring N., 2006, PC WORLD
[9]
Gonick L., 2010, 2010 YEAR AHEAD IT H
[10]
Gregg M., 2010, 2010 PREDICTIONS WHA