Review article
Analysis of the Use of Neutralisation Techniques in Violations of Information Security
Darko Matotek
Full text: croatian pdf 127 Kb
page 182-191
downloads: 873
cite
APA 6th Edition
Matotek, D. (2012). Analysis of the Use of Neutralisation Techniques in Violations of Information Security. Ekonomski vjesnik, XXV (1), 192-192. Retrieved from https://hrcak.srce.hr/84756
MLA 8th Edition
Matotek, Darko. "Analysis of the Use of Neutralisation Techniques in Violations of Information Security." Ekonomski vjesnik, vol. XXV, no. 1, 2012, pp. 192-192. https://hrcak.srce.hr/84756. Accessed 19 Nov. 2024.
Chicago 17th Edition
Matotek, Darko. "Analysis of the Use of Neutralisation Techniques in Violations of Information Security." Ekonomski vjesnik XXV, no. 1 (2012): 192-192. https://hrcak.srce.hr/84756
Harvard
Matotek, D. (2012). 'Analysis of the Use of Neutralisation Techniques in Violations of Information Security', Ekonomski vjesnik, XXV(1), pp. 192-192. Available at: https://hrcak.srce.hr/84756 (Accessed 19 November 2024)
Vancouver
Matotek D. Analysis of the Use of Neutralisation Techniques in Violations of Information Security. Ekonomski vjesnik [Internet]. 2012 [cited 2024 November 19];XXV(1):192-192. Available from: https://hrcak.srce.hr/84756
IEEE
D. Matotek, "Analysis of the Use of Neutralisation Techniques in Violations of Information Security", Ekonomski vjesnik, vol.XXV, no. 1, pp. 192-192, 2012. [Online]. Available: https://hrcak.srce.hr/84756. [Accessed: 19 November 2024]
Abstract
Keywords
Hrčak ID:
84756
URI
https://hrcak.srce.hr/84756
Publication date:
2.7.2012.
Article data in other languages:
croatian
Visits: 1.903
*