Organizing for Security

作者: Paul Rohmeyer

DOI: 10.1007/0-306-48638-5_12

关键词:

摘要: … Finally, governance activities may be described as oversight practices. Schneier [24] observed that in practice, “Digital security tends to rely wholly on prevention: cryptography, firewalls…

参考文章(23)
R. Simons, Antonio Davila, How High Is Your Return on Management ,(1998)
Ira Sack, Joseph Morabito, Anilkumar Bhate, Organization Modeling: Innovative Architectures for the 21st Century ,(1999)
Chris Prosise, Kevin Mandia, Incident Response: Investigating Computer Crime ,(2001)
Ikujiro Nonaka, The Knowledge Creating Company ,(2008)
G. Winfield Treese, Lawrence C. Stewart, Designing Systems for Internet Commerce ,(2002)
R. Power, CSI/FBI computer crime and security survey Computer Security Journal. ,vol. 17, pp. 20- 51 ,(2001)
Laurence Prusak, Thomas H Davenport, None, Information Ecology: Mastering the Information and Knowledge Environment ,(1997)
Thomas R. Peltier, Information Security Risk Analysis ,(2001)