Login / Signup
How to supervise and control I/S Security Officers and Auditors.
Rolf T. Moulton
Published in:
Comput. Secur. (1987)
Keyphrases
</>
control system
information security
security policies
security requirements
optimal control
security threats
data sets
database systems
data acquisition
network security
control method
human operators
security problems