Analysing information security threats in healthcare information system using survival analysis method [electronic resource] /

Bibliographic Details
Main Author: Ganthan Narayana Samy, 1977-
Format:
Language:eng
Published: 2012
Subjects:
_version_ 1796741300399112192
author Ganthan Narayana Samy, 1977-
author_facet Ganthan Narayana Samy, 1977-
author_sort Ganthan Narayana Samy, 1977-
collection OCEAN
description
first_indexed 2024-03-05T11:42:51Z
format
id KOHA-OAI-TEST:464333
institution Universiti Teknologi Malaysia - OCEAN
language eng
last_indexed 2024-03-05T11:42:51Z
publishDate 2012
record_format dspace
spelling KOHA-OAI-TEST:4643332020-12-19T17:17:02ZAnalysing information security threats in healthcare information system using survival analysis method [electronic resource] / Ganthan Narayana Samy, 1977- 2012engIncludes bibliographical referencesPSZJBLComputer securityData protection
spellingShingle Computer security
Data protection
Ganthan Narayana Samy, 1977-
Analysing information security threats in healthcare information system using survival analysis method [electronic resource] /
title Analysing information security threats in healthcare information system using survival analysis method [electronic resource] /
title_full Analysing information security threats in healthcare information system using survival analysis method [electronic resource] /
title_fullStr Analysing information security threats in healthcare information system using survival analysis method [electronic resource] /
title_full_unstemmed Analysing information security threats in healthcare information system using survival analysis method [electronic resource] /
title_short Analysing information security threats in healthcare information system using survival analysis method [electronic resource] /
title_sort analysing information security threats in healthcare information system using survival analysis method electronic resource
topic Computer security
Data protection
work_keys_str_mv AT ganthannarayanasamy1977 analysinginformationsecuritythreatsinhealthcareinformationsystemusingsurvivalanalysismethodelectronicresource