![](/global/images/ghost.gif) |
![](/global/images/ghost.gif) |
![](/global/images/ghost.gif) |
![](/global/images/ghost.gif) |
![](/global/images/ghost.gif) |
![](/global/images/ghost.gif) |
![](/global/images/ghost.gif) |
Research Home
Tools Art & Architecture Thesaurus Source Record
|
![](/global/images/ghost.gif) |
![](/global/images/ghost.gif) |
![](/global/images/ghost.gif) |
![Art & Architecture Thesaurus Source Record](/research/tools/vocabularies/images/header_aat_source.gif) |
![](/global/images/ghost.gif) |
![](/global/images/ghost.gif) |
![](/global/images/ghost.gif) |
![Previous Page](/research/tools/vocabularies/images/previous_page.gif) |
![Help](/global/images/global_help.gif) |
![](/global/images/ghost.gif) |
![](/global/images/ghost.gif) |
![](/global/images/ghost.gif) |
![](/global/images/ghost.gif) |
![](/global/images/ghost.gif) |
![](/global/images/ghost.gif) |
Source ID: 2000096504
|
Brief Citation: Kayem, Information Security in Diverse Computing Environments (2014)
|
Full Citation: Kayem, Anne. Information Security in Diverse Computing Environments. Hershey, Pennsylvania: IGI Global, 2014.
|
![](/global/images/ghost.gif) |
![](/global/images/ghost.gif) |
![](/global/images/ghost.gif) |
![](/global/images/ghost.gif) |
![New Search](/global/images/global_new_search.gif) |
|