SP 800-16. Information Technology Security Training Requirements: a Role- and Performance-Based Model
暂无分享,去创建一个
Mark Wilson | Dorothea E. de Zafra | Sadie I. Pitcher | John D. Tressler | John B. Ippolito | Mark Wilson | Dorothea E. de Zafra | John Ippolito
[1] Valorie Beer,et al. Levels of Evaluation , 1986 .
[2] A. Carnevale,et al. Return on Investment: Accounting for Training. , 1990 .
[3] L. Sjodahl. Evaluation of Training. , 1975 .
[4] Jeffrey A. Cantor. Delivering Instruction to Adult Learners , 1992 .
[5] Wilda B. Newman. Information Resources Manager , 1987 .
[6] Martha Reeves,et al. Evaluation of Training , 1993 .
[7] Robert L. Mccaul,et al. Curriculum , 1956 .