Best practices show the way to information security maturity
暂无分享,去创建一个
[1] Rossouw von Solms,et al. Information security governance: Due care , 2006, Comput. Secur..
[2] Paul Williams. Information Security Governance , 2001, Inf. Secur. Tech. Rep..
[3] Gary McGraw,et al. On Bricks and Walls: Why Building Secure Software is Hard , 2002, Computers & security.
[4] Luo Huai,et al. System Security Engineering Capability Maturity Model , 2003 .
[5] Martha Maria Lessing. A model for best practice driven information security governance , 2008 .
[6] Rolf Moulton,et al. Applying information security governance , 2003, Comput. Secur..
[7] Bruce Hunter. Information Security: Raising Awareness , 2000 .
[8] Rossouw von Solms,et al. Information Security Governance - A Re-Definition , 2004, IICIS.
[9] E. Sandstrom,et al. Cyber security , 2005, International Symposium CIGRE/IEEE PES, 2005..
[10] J. van Leeuwen,et al. Information Security , 2003, Lecture Notes in Computer Science.