Login / Signup

Heuristics for Evaluating IT Security Management Tools.

Pooya JaferianKirstie HawkeyAndreas SotirakopoulosMaria Velez-RojasKonstantin Beznosov
Published in: Hum. Comput. Interact. (2014)
Keyphrases
  • management tools
  • knowledge management
  • end users
  • intrusion detection
  • network security
  • web applications
  • data management
  • information security
  • project management
  • metadata
  • expert systems