A business approach to effective information technology risk analysis and management
暂无分享,去创建一个
Rossouw von Solms | Karin P. Badenhorst | Sharon Halliday | K. Badenhorst | R. V. Solms | S. Halliday
[1] V. Daniel Hunt. Reengineering: Leveraging the Power of Integrated Product Development , 1993 .
[2] Charles Cresson Wood. Effective information security management , 1991 .
[3] Karen A. Forcht,et al. Computer Security Management , 1993 .
[4] Martin R. Smith. Commonsense computer security: Your practical guide to preventing accidental and deliberate electronic data loss , 1989 .
[5] Sue A. Conger,et al. The new software engineering , 1993, notThenot Wadsworth series in management information series.
[6] Jan H. P. Eloff,et al. A comparative framework for risk analysis methods , 1993, Comput. Secur..
[7] Sergio B. Guarro. Principles and procedures of the LRAM approach to information systems risk analysis and management , 1987, Comput. Secur..
[8] W. Caelli,et al. Information Security Handbook , 1991 .