A Discussion on Life Systems Security and the Systems Approach
暂无分享,去创建一个
[1] Lech J. Janczewski,et al. Managerial guide for handling cyber-terrorism and information warfare , 2005 .
[2] Edward G. Amoroso,et al. Fundamentals of computer security technology , 1994 .
[3] Bill Landreth. Out of the Inner Circle , 1985 .
[4] Jennifer Seberry,et al. Fundamentals of Computer Security , 2003, Springer Berlin Heidelberg.
[5] Karen A. Forcht,et al. Computer Security Management , 1993 .
[6] Brian Bagnall. On the Edge: The Spectacular Rise and Fall of Commodore , 2006 .
[7] T. Whiteside,et al. Computer capers : tables of electronic thievery, embezzlement, and fraud , 1978 .
[8] Herbert J. Mattord,et al. Principles of Information Security , 2004 .
[9] Fred Cohen,et al. Computer viruses—theory and experiments , 1990 .
[10] Tim Berners-Lee,et al. Information Management: A Proposal , 1990 .
[11] Lech J. Janczewski,et al. Governance Life Cycle Framework for Managing Security in Public Cloud: From User Perspective , 2011, 2011 IEEE 4th International Conference on Cloud Computing.
[12] B. Jack Copeland,et al. Colossus: The secrets of Bletchley Park's code-breaking computers , 2006 .