Login / Signup

Information security policy development and implementation: The what, how and who.

Stephen V. FlowerdayTite Tuyikeze
Published in: Comput. Secur. (2016)
Keyphrases
  • information processing
  • real world
  • keywords
  • security policies
  • databases
  • end users
  • dimensionality reduction
  • unsupervised learning