Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/134226
Title: | Analyzing and Interpreting the Threat Mitigation Strategies in Information Systems Conceptual and Operational Explorations |
Researcher: | Khan, Qamar Rayees |
Guide(s): | M. Asger |
Keywords: | Information Systems |
University: | Baba Ghulam Shah Badshah University |
Completed Date: | 6-6-2016 |
Abstract: | newline |
Pagination: | |
URI: | http://hdl.handle.net/10603/134226 |
Appears in Departments: | Department of Computer Sciences |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
abstract.pdf | Attached File | 266.04 kB | Adobe PDF | View/Open |
acknowledgements.pdf | 256.87 kB | Adobe PDF | View/Open | |
chapter-iii.pdf | 317.27 kB | Adobe PDF | View/Open | |
chapter-ii.pdf | 842.08 kB | Adobe PDF | View/Open | |
chapter-i.pdf | 611.53 kB | Adobe PDF | View/Open | |
chapter-iv.pdf | 565.12 kB | Adobe PDF | View/Open | |
chapter-vi.pdf | 276.84 kB | Adobe PDF | View/Open | |
chapter-v.pdf | 1.27 MB | Adobe PDF | View/Open | |
contents.pdf | 211.49 kB | Adobe PDF | View/Open | |
references.pdf | 396 kB | Adobe PDF | View/Open | |
title page.pdf | 78.64 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial 4.0 International (CC BY-NC 4.0).