Login / Signup

A methodology to include computer security, safety and resilience requirements as part of the user requirement.

D. N. J. MostertSebastiaan H. von Solms
Published in: Comput. Secur. (1994)
Keyphrases