![]() | ![]() |
2002 | ||
---|---|---|
6 | EE | Judith M. Myerson: Identifying enterprise network vulnerabilities. Int. Journal of Network Management 12(3): 135-144 (2002) |
2001 | ||
5 | EE | Judith M. Myerson: A Hands-On Guide to TCP/IP Networking. IEEE Distributed Systems Online 2(4): (2001) |
4 | EE | Judith M. Myerson: Identifying threats or assets: which come first? Int. Journal of Network Management 11(4): 207-211 (2001) |
3 | Judith M. Myerson: Web engineering: now and beyond. Software Focus 2(3): 117-120 (2001) | |
2000 | ||
2 | EE | Judith M. Myerson: Computer speech: streaming technology. Int. Journal of Network Management 10(1): 51-55 (2000) |
1999 | ||
1 | EE | Judith M. Myerson: Risk management. Int. Journal of Network Management 9(5): 305-308 (1999) |