Login / Signup
Best Practices for Building a Security Operations Center.
Diana Kelley
Ron Moritz
Published in:
Inf. Secur. J. A Glob. Perspect. (2006)
Keyphrases
</>
intrusion detection
access control
security issues
information security
security problems
data security
security systems
security level
data warehouse
rfid tags
security requirements
computer security
security model
security threats
security management
information assurance