The utilization of trend analysis in the effective monitoring of information security. Part 2: the model

Author: Botha Martin   von Solms Rossouw  

Publisher: Emerald Group Publishing Ltd

ISSN: 0968-5227

Source: Information Management & Computer Security, Vol.10, Iss.1, 2002-03, pp. : 5-11

Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.

Previous Menu Next

Abstract