Sign in

The Security Policy Application Process: Action Research.

Isabel LopesPedro Oliveira
Published in: WorldCIST (2) (2016)
Keyphrases
  • security policies
  • security architecture
  • security management
  • case study
  • access control
  • process model
  • network management