[go: up one dir, main page]

Gallaher et al., 2008 - Google Patents

Cyber security: Economic strategies and public policy alternatives

Gallaher et al., 2008

Document ID
17646125216695293417
Author
Gallaher M
Link A
Rowe B
Publication year

External Links

Snippet

Page 1 EE CYBER SECURITY Economic Strategies and Public Policy Alternatives Michael P. Gallaher Albert N. Link⚫ Brent R. Rowe Jnhodrtu5vh1fdgnud greiuygb cohsu4ohnu ihtinuous loudnhugosi iuighfi696b9 Jeqtr.c5418ho shri7denuc yibce 87fzs74ch 1u64yhaw …
Continue reading at books.google.com (other versions)

Similar Documents

Publication Publication Date Title
Jacobs Engineering information security: The application of systems engineering concepts to achieve information assurance
Grance et al. Computer Security Incident Handling Guide:.
US20080047016A1 (en) CCLIF: A quantified methodology system to assess risk of IT architectures and cyber operations
Salim Cyber safety: A systems thinking and systems theory approach to managing cyber security risks
Scarfone et al. Computer security incident handling guide
Liu et al. A survey of payment card industry data security standard
Falch et al. Cybersecurity strategies for SMEs in the Nordic Baltic region
Gallaher et al. Cyber security: Economic strategies and public policy alternatives
Rawal et al. Cybersecurity and identity access management
Mishra Modern cybersecurity strategies for enterprises
Swanzy et al. Data security framework for protecting data in transit and data at rest in the cloud
Jackson Network security auditing
Ayereby Overcoming data breaches and human factors in minimizing threats to cyber-security ecosystems
Morris et al. Cybersecurity as a Service
May et al. Defense in depth: foundation for secure and resilient it enterprises
Falch et al. Cybersecurity in SMEs in the Baltic Sea Region
Van der Heide Establishing a CSIRT
Hermanus Information system security vulnerabilities: Implications for South African financial firms in Cape Town
Battleground Management Information Systems: Managing the Digital Firm
Kaestner et al. The cybersecurity challenge in acquisition
Bolhari Electronic-supply chain information security: a framework for information
Azad Securing Citrix XenApp Server in the Enterprise
Lagana Information security in an ever-changing threat landscape
DeFleice Prevention and Mitigation against Cyberattacks: Bare Minimum
Almutairi et al. Identification and Management of Growing Security Threats towards KSA