Information Security Awareness
暂无分享,去创建一个
[1] Sushil K. Sharma,et al. Handbook of Research on Information Security and Assurance , 2008 .
[2] Peter Cochrane. 108 Tips for Time Travellers , 1999 .
[3] Andrea Omicini,et al. Engineering Multi-Agent Systems in LuCe , 2000 .
[4] Ali Serhan Koyuncugil,et al. Surveillance Technologies and Early Warning Systems: Data Mining Applications for Risk Detection , 2010 .
[5] Joan Hash,et al. Building an Information Technology Security Awareness and Training Program , 2003 .
[6] L. Johnson,et al. Minimum Security Requirements for Federal Information and Information Systems , 2006 .
[7] R. Priest. Data Protection Act , 1988 .
[8] Marianne M. Swanson,et al. Recommended Security Controls for Federal Information Systems | NIST , 2005 .
[9] Mario Piattini,et al. An MDA Compliant Approach for Designing Secure Data Warehouses , 2009, Database Technologies: Concepts, Methodologies, Tools, and Applications.
[10] Rebecca Herold,et al. Managing an Information Security and Privacy Awareness and Training Program, Second Edition , 2010 .
[11] Randall F. Trzeciak,et al. Common Sense Guide to Prevention and Detection of Insider Threats , 2006 .
[12] Jameson M. Wetmore,et al. Encyclopedia of information ethics and security , 2008 .