Login / Signup
Information security policy development and implementation: The what, how and who.
Stephen V. Flowerday
Tite Tuyikeze
Published in:
Comput. Secur. (2016)
Keyphrases
</>
information processing
real world
keywords
security policies
databases
end users
dimensionality reduction
unsupervised learning