Login / Signup

Using the Private-Internet-Enterprise (PIE) Model to Examine IT Risks and Threats Due to Porous Perimeters.

Brett J. L. LandryM. Scott KogerSandra BlankeChristian Nielsen
Published in: Inf. Secur. J. A Glob. Perspect. (2009)
Keyphrases