Login / Signup
IT Security Certifications: Stakeholder Evaluation and Selection.
Nicholas J. A. Tate
Sharman Lichtenstein
Matthew J. Warren
Published in:
ACIS (2008)
Keyphrases
</>
security properties
access control
information security
evaluation method
security policies
security analysis
case study
intrusion detection
statistical databases
selection strategy
functional requirements
security protocols
database security