文
论文分享
演练场
杂货铺
论文推荐
字
编辑器下载
登录
注册
Enemy at the gate
复制论文ID
分享
摘要
作者
参考文献
暂无分享,去
创建一个
A firm can build more effective security strategies by identifying and ranking the severity of potential threats to its IS efforts.
E WhitmanMichael
保存到论文桶