Login / Signup
Preparing for Cyber Threats with Information Security Policies.
Ilona Ilvonen
Pasi Virtanen
Published in:
Int. J. Cyber Warf. Terror. (2013)
Keyphrases
</>
security policies
real world
distributed databases
unauthorized access