Security Strategy Analysis for Critical Information Infrastructures
暂无分享,去创建一个
[1] Gurpreet Dhillon,et al. Computer crimes: theorizing about the enemy within , 2001, Comput. Secur..
[2] Jac A. M. Vennix,et al. Group model-building: tackling messy problems , 1999 .
[3] Kim Warren,et al. Competitive Strategy Dynamics , 2002 .
[4] George P. Richardson,et al. Teamwork in group model building , 1995 .
[5] Gurpreet Dhillon,et al. Managing and controlling computer misuse , 1999, Inf. Manag. Comput. Secur..
[6] Reinhardt A. Botha,et al. Reflecting on 20 SEC conferences , 2006, Comput. Secur..
[7] William L. Simon,et al. The Art of Deception , 2002 .
[8] Kim Warren,et al. Strategic Management Dynamics , 2008 .
[9] John D. Sterman,et al. System Dynamics: Systems Thinking and Modeling for a Complex World , 2002 .
[10] Gurpreet Dhillon,et al. Refereed Papers: Violation of Safeguards by Trusted Personnel and Understanding Related Information Security Concerns , 2001 .
[11] John D. Sterman,et al. Business dynamics : systems thinking and modelling for acomplex world , 2002 .
[12] Bruce Schneier,et al. Applied cryptography : protocols, algorithms, and source codein C , 1996 .
[13] Peter M. Senge,et al. Modeling For Learning Organizations , 1994 .
[14] Javier Santos,et al. Modeling and Simulating Information Security Management , 2007, CRITIS.