Login / Signup

A methodology for estimating the tangible cost of data breaches.

Robert LaytonPaul A. Watters
Published in: J. Inf. Secur. Appl. (2014)
Keyphrases