E-enterprise security management life cycle
暂无分享,去创建一个
[1] Heather M. Hinton. Under-specification, composition and emergent properties , 1998, NSPW '97.
[2] David A. Fisher,et al. Survivability—a new technical and business perspective on security , 1999, NSPW '99.
[3] David S. Linthicum,et al. Enterprise Application Integration with CORBA Component and Web-Based Solutions , 1999 .
[4] Jay F. Nunamaker,et al. Systems Development in Information Systems Research , 1990, J. Manag. Inf. Syst..
[5] Peter Dayan,et al. Neural Models for Part-Whole Hierarchies , 1996, NIPS.
[6] F. David,et al. Statistical Techniques in Simulation: Part I , 1975 .
[7] E. Rolls,et al. INVARIANT FACE AND OBJECT RECOGNITION IN THE VISUAL SYSTEM , 1997, Progress in Neurobiology.
[8] Rudy Hirschheim,et al. A Paradigmatic Analysis Contrasting Information Systems Development Approaches and Methodologies , 1998, Inf. Syst. Res..
[9] Shirley Gregor,et al. The systems development or engineering approach to research in information systems: an action research perspective , 1999 .
[10] David A. Fisher,et al. Emergent algorithms-a new method for enhancing survivability in unbounded systems , 1999, Proceedings of the 32nd Annual Hawaii International Conference on Systems Sciences. 1999. HICSS-32. Abstracts and CD-ROM of Full Papers.
[11] David E. Avison,et al. Information systems practice, education and research , 1991, Inf. Syst. J..