Article,

A Guide to Selecting and Implementing Security Controls.

.
Information Systems Security, 3 (2): 75-86 (1994)

Meta data

Tags

Users

  • @dblp

Comments and Reviews