Login / Signup

A business approach to effective information technology risk analysis and management.

Sharon HallidayKarin P. BadenhorstRossouw von Solms
Published in: Inf. Manag. Comput. Secur. (1996)
Keyphrases