• search
    search
  • reviewers
    reviewers
  • feeds
    feeds
  • assignments
    assignments
  • settings
  • logout

Using the Private-Internet-Enterprise (PIE) Model to Examine IT Risks and Threats Due to Porous Perimeters.

Brett J. L. LandryM. Scott KogerSandra BlankeChristian Nielsen
Published in: Inf. Secur. J. A Glob. Perspect. (2009)
Keyphrases