Secure Knowledge Management
Year of publication: |
2004-02
|
---|---|
Authors: | Mundy, D.P. ; Chadwick, David.W. |
Other Persons: | Wickramasinghe, c. (contributor) ; Gupta, J.N.D. (contributor) ; Sharma, S.K. (contributor) |
Publisher: |
Idea Publishing Group |
Subject: | QA 76 Software | computer programming |
-
Incorporating Security Behaviour into Business Models Using a Model Driven Approach
Linington, Peter.F., (2007)
-
The Link between BPR, Evolutionary Delivery and Evolutionary Development
Johnson, L., (1997)
-
Merging and Extending the PGP and PEM Trust Models - the ICE-TEL Trust Model
Chadwick, D.W., (1997)
- More ...
-
Wickramasinghe, C., (2011)
-
Distribution planning using capacitated clustering and vehicle routing problem
Rautela, Anubha, (2019)
-
Lean implementation and its benefits to production industry
Singh, Bhim, (2010)
- More ...