Implementing Knowledge Management Techniques for Security Purposes
暂无分享,去创建一个
Stefanos Gritzalis | Christos Skourlas | Petros Belsis | Ioannis Drakopoulos | S. Gritzalis | C. Skourlas | P. Belsis | Ioannis Drakopoulos
[1] Thomas H. Davenport,et al. The rise of knowledge towards attention management , 2001, J. Knowl. Manag..
[2] Scott McCoy,et al. The most important issues in knowledge management , 2002, CACM.
[3] Jaideep Srivastava,et al. Detection of Novel Network Attacks Using Data Mining , 2003 .
[4] Dennis Longley,et al. Electronic Information Security Documentation , 2003, ACSW.
[5] Rory L. Chase,et al. The Knowledge-Based Organization: An International Survey , 1997, J. Knowl. Manag..
[6] M. Lindvall,et al. Knowledge management in software engineering , 2002, IEEE Software.
[7] Atefeh Sadri McCampbell,et al. Knowledge management: the new challenge for the 21st century , 1999, J. Knowl. Manag..
[8] George A. Vouros,et al. Technological issues towards knowledge-powered organizations , 2003, J. Knowl. Manag..
[9] M. Polanyi. Chapter 7 – The Tacit Dimension , 1997 .
[10] Rossouw von Solms,et al. The information security management toolbox - taking the pain out of security management , 2002, Inf. Manag. Comput. Secur..
[11] Carla O'Dell,et al. If Only We Knew What We Know: Identification and Transfer of Internal Best Practices , 1998 .