Article,

Investing in IT Security: How to Determine the Maximum Threshold.

, , and .
Int. J. Inf. Secur. Priv., 6 (3): 75-87 (2012)

Meta data

Tags

Users

  • @dblp

Comments and Reviews