The utility of security standards
暂无分享,去创建一个
[1] Carol Woody,et al. Applying OCTAVE: Practitioners Report , 2006 .
[2] J. Altmann,et al. Observational study of behavior: sampling methods. , 1974, Behaviour.
[3] Cormac Herley,et al. So long, and no thanks for the externalities: the rational rejection of security advice by users , 2009, NSPW '09.
[4] P. Checkland. Soft Systems Methodology: A Thirty Year Retrospective a , 2000 .
[5] John Boardman,et al. Systems Thinking: Coping with 21st Century Problems , 2008 .
[6] Marianne M. Swanson,et al. Recommended Security Controls for Federal Information Systems , 2005 .
[7] Jim Appleyard,et al. Information Classification , 2011, Encyclopedia of Information Assurance.
[8] Gary McGraw,et al. The Building Security in Maturity Model ({BSIMM}) , 2009 .
[9] Leonard E. Miller,et al. NASA systems engineering handbook , 1995 .
[10] Baruch Nevo,et al. Face validity revisited. , 1985 .
[11] Peter Checkland,et al. Process and content: two ways of using SSM , 2006, J. Oper. Res. Soc..