Security strategy from requirements to reality
Saved in:
Main Author: | Stackpole, Bill |
---|---|
Other Authors: | Oksendahl, Eric |
Format: | Unknown |
Published: |
Boca Raton, FL
Taylor & Francis Group
2011
|
Subjects: | |
Online Access: | Click Here to View Status and Holdings. |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Information Technology Security
by: Siti Rahayu Selamat
Published: (2006) -
CISO soft skills securing organizations impaired by employee politics, apathy, and intolerant perspectives
by: Collette, Ronald D.
Published: (2009) -
Engineering information security the application of systems engineering concepts to achieve information assurance
by: Jacobs, Stuart
Published: (2011) -
Information security protecting the global enterprise
by: Pipkin, Donald L
Published: (2000) -
The security risk assessment handbook a complete guide for performing security risk assessments
by: Landoll, Douglas J.
Published: (2010)