Risk analysis and assessment using object-oriented techniques
暂无分享,去创建一个
[1] John Millar Carroll,et al. Managing Risk: A Computer Aided Strategy , 1984 .
[2] Charles Cresson Wood,et al. Computer Security: A Comprehensive Controls Checklist , 1987 .
[3] Houston H. Carr,et al. Risk Analysis for Information Technology , 1991, J. Manag. Inf. Syst..
[4] Robert H. Courtney,et al. Security risk assessment in electronic data processing systems , 1977, AFIPS '77.
[5] Cheng Che Chen,et al. Parallel hierarchical molecular structure estimation , 1996, Proceedings of the 1996 ACM/IEEE Conference on Supercomputing.
[6] Scott Oaks,et al. Java Security , 1998 .