Login / Signup
Investing in IT Security: How to Determine the Maximum Threshold.
Amanda Eisenga
Travis L. Jones
Walter Rodriguez
Published in:
Int. J. Inf. Secur. Priv. (2012)
Keyphrases
</>
information security
access control
security policies
intrusion detection
computer security
neural network
network security
security issues
security systems
security requirements
security mechanisms
data security
cyber attacks