Author: Kearney P. Brügger L.
Publisher: Springer Publishing Company
ISSN: 1358-3948
Source: BT Technology Journal, Vol.25, Iss.1, 2007-01, pp. : 141-153
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content
Security risk mitigation for information systems
By Page V. Dixon M. Choudhury I.
BT Technology Journal, Vol. 25, Iss. 1, 2007-01 ,pp. :
Security risk management in the BT HP alliance
By Todd M. Zibert E. Midwinter T.
BT Technology Journal, Vol. 24, Iss. 4, 2006-10 ,pp. :
Creating an effective security risk model for outsourcing decisions
BT Technology Journal, Vol. 25, Iss. 1, 2007-01 ,pp. :