Framework to Manage Information Security for Malaysian Academic Environment
暂无分享,去创建一个
Maslin Masrom | Zuraini Ismail | Zailani Mohamad Sidek | Dayang Suhana Hamzah | M. Masrom | Z. Ismail
[1] T. Muller,et al. The fourth wave , 1984 .
[2] Alexander Schure,et al. The Fourth Wave , 1984, Photonics West - Lasers and Applications in Science and Engineering.
[3] J Brown. The security factor , 1988 .
[4] Raymond Elliott. Information Security in Higher Education. Professional Paper Series, #5. , 1991 .
[5] Bill Hancock,et al. New York Times Fires Employees for Violating Internal E-mail Policies , 2000, Comput. Secur..
[6] Clare Brindley,et al. The information‐risk conundrum , 2001 .
[7] Jan H. P. Eloff,et al. Feature: What Makes an Effective Information Security Policy? , 2002 .
[8] M. Whitman,et al. Management Of Information Security , 2004 .
[9] Sebastiaan H. von Solms,et al. Information Security - The Fourth Wave , 2006, Comput. Secur..
[10] L. R. Chao,et al. An empirical study of information security policy on information security elevation in Taiwan , 2006, Inf. Manag. Comput. Secur..
[11] Moses Garuba,et al. A Comparative Analysis of Anti-Malware Software, Patch Management, and Host-Based Firewalls in Preventing Malware Infections on Client Computers , 2008, Fifth International Conference on Information Technology: New Generations (itng 2008).
[12] Shirley M. Radack,et al. Risk Management Framework: Helping Organizations Implement Effective Information Security Programs | NIST , 2009 .