Login / Signup
Information Security: Process Evaluation and Product Evaluation.
Mariki M. Eloff
Sebastiaan H. von Solms
Published in:
SEC (2000)
Keyphrases
</>
information security
decision making
learning algorithm
object recognition
intrusion detection
network security
information assurance