Login / Signup
From Trusted Information Security Controls to a Trusted Information Security Environment.
Rossouw von Solms
Helen van de Haar
Published in:
SEC (2000)
Keyphrases
</>
information security
security level
data mining
information systems
intrusion detection
countermeasures
technical issues
computer systems
privacy preserving
information sharing
network security
privacy concerns