Login / Signup
Information Security Policy: A Management Practice Perspective.
Moneer Alshaikh
Sean B. Maynard
Atif Ahmad
Shanton Chang
Published in:
CoRR (2016)
Keyphrases
</>
security policies
access control
computer systems
network management
database
real world
data mining
end users
data processing
event logs