Effectiveness of security controls in BYOD environments
暂无分享,去创建一个
[1] Sean B. Maynard,et al. Information security strategies: towards an organizational multi-strategy perspective , 2014, J. Intell. Manuf..
[2] Moshe Zviran,et al. Password Security: An Empirical Study , 1999, J. Manag. Inf. Syst..
[3] Jeffery Payne. Secure Mobile Application Development , 2013, IT Professional.
[4] Steve Mansfield-Devine,et al. Interview: BYOD and the enterprise network , 2012 .
[5] Bill Morrow,et al. BYOD security challenges: control and protect your most sensitive data , 2012, Netw. Secur..
[6] Detmar W. Straub,et al. Effective IS Security: An Empirical Study , 1990, Inf. Syst. Res..
[7] Steve Purser. Why access control is difficult , 2002, Comput. Secur..
[8] Jan H. P. Eloff,et al. A taxonomy for information security technologies , 2003, Comput. Secur..