Dynamic Semi-Group CIA Pattern Optimizing the Risk on RTS
暂无分享,去创建一个
[1] Jody Brazil,et al. Security metrics to manage change , 2014, Netw. Secur..
[2] William Stallings,et al. Cryptography and network security , 1998 .
[3] Jason Andress. The Basics of Information Security, Second Edition: Understanding the Fundamentals of InfoSec in Theory and Practice , 2014 .
[4] Edwin B. Heinlein. Principles of information systems security , 1995, Comput. Secur..
[5] Edgar G. Goodaire,et al. Discrete Mathematics With Graph Theory , 1997 .
[6] Félix Gómez Mármol,et al. Editorial: Special issue on Identity Protection and Management , 2014, J. Inf. Secur. Appl..
[7] Rolf Stadler,et al. Resource Management in Clouds: Survey and Research Challenges , 2015, Journal of Network and Systems Management.
[8] Fred Cohen,et al. Managing network security - Part 9: Penetration testing? , 1997 .
[9] FinneThomas. Information Systems Risk Management , 2000 .
[10] Julie D. Nosworthy. A Practical Risk Analysis Approach: Managing BCM Risk , 2000, Comput. Secur..
[11] Dario Forte,et al. Security Audits: Security audits in mixed environments , 2009 .
[12] Bernard Kolman,et al. Discrete Mathematical Structures , 1984 .
[13] Mário M. Freire,et al. Security issues in cloud environments: a survey , 2014, International Journal of Information Security.
[14] N. M. Sheikh. Advance Computer Architecture , 2014 .
[15] Thomas Finne,et al. Information Systems Risk Management: Key Concepts and Business Processes , 2000, Comput. Secur..
[16] Steve Mansfield-Devine. Building in security , 2014, Netw. Secur..