Login / Signup
Developing a Computer Security Policy for Organizational Use and Implementation.
Karen A. Forcht
Walter Cary Ayers
Published in:
J. Comput. Inf. Syst. (2001)
Keyphrases
</>
security policies
security management
access control
information systems
distributed systems
network management
change management
model based testing
knowledge management
security requirements
critical success factors
network security
real world
computer systems
hardware and software