Login / Signup
The Security Policy Application Process: Action Research.
Isabel Lopes
Pedro Oliveira
Published in:
WorldCIST (2) (2016)
Keyphrases
</>
security policies
security architecture
security management
case study
access control
process model
network management