Issues and Opinions: Assessing the Emphasis on Information Security in the Systems Analysis and Design Course
暂无分享,去创建一个
[1] Mat Honan. 29. How Apple and Amazon Security Flaws Led to My Epic Hacking , 2013 .
[2] Donna F. Dodson,et al. INFORMATION SECURITY AND PRIVACY ADVISORY BOARD , 2012 .
[3] Moshe Zviran,et al. Identification and Authentication: Technology and Implementation Issues , 2006, Commun. Assoc. Inf. Syst..
[4] Abhi Shelat,et al. Remembrance of Data Passed: A Study of Disk Sanitization Practices , 2003, IEEE Secur. Priv..
[5] Alan R. Dennis,et al. Systems Analysis and Design with UML , 2003 .
[6] Julie E. Kendall,et al. Systems analysis and design , 1981 .
[7] Shirley Radack,et al. Federal Information Processing Standard (FIPS) 199, Standards for Security Categorization of Federal Information and Information Systems , 2004 .
[8] Amitava Dutta,et al. Management's Role in Information Security in a Cyber Economy , 2002 .
[9] Annabelle Lee,et al. Information Security in the System Development Life Cycle | NIST , 2004 .
[10] Michael R. Grimaila,et al. Evaluation of security solutions in the SCADA environment , 2014, DATB.
[11] William C. Barker,et al. Volume I: Guide for Mapping Types of Information and Information Systems to Security Categories , 2008 .
[12] Leon Gommans,et al. Generic AAA Architecture , 2000, RFC.
[13] Jeffrey L. Whitten,et al. Systems Analysis and Design Methods , 1986 .
[14] David W. Miller,et al. On Contending with Unruly Neighbors in the Global Village: Viewing Information Systems as Both Weapon and Target , 2011, Commun. Assoc. Inf. Syst..
[15] Ryan T. Wright,et al. IS 2010: Curriculum Guidelines for Undergraduate Degree Programs in Information Systems , 2010, Commun. Assoc. Inf. Syst..
[16] Frantz Rowe,et al. Functionality vs. Security in IS: Tradeoff or Equilibrium? , 2012, ICIS.
[17] Patrick D. Howard,et al. Official (ISC)2? Guide to the CAP? CBK? , 2012 .
[18] J. Initiative. SP 800-39. Managing Information Security Risk: Organization, Mission, and Information System View , 2011 .
[19] Peter G. Neumann. Risks to the Public in Computers and Related Systems , 1995, SOEN.
[20] Barry W. Boehm,et al. Software Engineering Economics , 1993, IEEE Transactions on Software Engineering.