![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
Author: Padet Colette
Publisher: Emerald Group Publishing Ltd
ISSN: 0368-492X
Source: Kybernetes: The International Journal of Systems & Cybernetics, Vol.25, Iss.1, 1996-01, pp. : 61-64
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
Applying information security governance
Computers and Security, Vol. 22, Iss. 7, 2003-10 ,pp. :
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
A Review of Information Security Principles
Computer Audit Update, Vol. 1997, Iss. 12, 1997-12 ,pp. :
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
A METHOD OF MANAGING COMPLEX FUZZY INFORMATION
By Jeang Neng-Liang Yang Ying-Kuei
Cybernetics and Systems, Vol. 33, Iss. 1, 2002-01 ,pp. :