Gallaher et al., 2008 - Google Patents
Cyber security: Economic strategies and public policy alternativesGallaher et al., 2008
- Document ID
- 17646125216695293417
- Author
- Gallaher M
- Link A
- Rowe B
- Publication year
External Links
Snippet
Page 1 EE CYBER SECURITY Economic Strategies and Public Policy Alternatives Michael
P. Gallaher Albert N. Link⚫ Brent R. Rowe Jnhodrtu5vh1fdgnud greiuygb cohsu4ohnu
ihtinuous loudnhugosi iuighfi696b9 Jeqtr.c5418ho shri7denuc yibce 87fzs74ch 1u64yhaw …
- 230000000694 effects 0 description 56
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Jacobs | Engineering information security: The application of systems engineering concepts to achieve information assurance | |
Grance et al. | Computer Security Incident Handling Guide:. | |
US20080047016A1 (en) | CCLIF: A quantified methodology system to assess risk of IT architectures and cyber operations | |
Salim | Cyber safety: A systems thinking and systems theory approach to managing cyber security risks | |
Scarfone et al. | Computer security incident handling guide | |
Liu et al. | A survey of payment card industry data security standard | |
Falch et al. | Cybersecurity strategies for SMEs in the Nordic Baltic region | |
Gallaher et al. | Cyber security: Economic strategies and public policy alternatives | |
Rawal et al. | Cybersecurity and identity access management | |
Mishra | Modern cybersecurity strategies for enterprises | |
Swanzy et al. | Data security framework for protecting data in transit and data at rest in the cloud | |
Jackson | Network security auditing | |
Ayereby | Overcoming data breaches and human factors in minimizing threats to cyber-security ecosystems | |
Morris et al. | Cybersecurity as a Service | |
May et al. | Defense in depth: foundation for secure and resilient it enterprises | |
Falch et al. | Cybersecurity in SMEs in the Baltic Sea Region | |
Van der Heide | Establishing a CSIRT | |
Hermanus | Information system security vulnerabilities: Implications for South African financial firms in Cape Town | |
Battleground | Management Information Systems: Managing the Digital Firm | |
Kaestner et al. | The cybersecurity challenge in acquisition | |
Bolhari | Electronic-supply chain information security: a framework for information | |
Azad | Securing Citrix XenApp Server in the Enterprise | |
Lagana | Information security in an ever-changing threat landscape | |
DeFleice | Prevention and Mitigation against Cyberattacks: Bare Minimum | |
Almutairi et al. | Identification and Management of Growing Security Threats towards KSA |