Skip to content
VuFind
All Fields
Title
Author
Subject
Call Number
ISBN/ISSN
Tag
Find
Advanced
Search
The utilization of trend analy...
Holdings
Cite this
Export Record
Export to RefWorks
Export to EndNoteWeb
Export to EndNote
The utilization of trend analysis in the effective monitoring of information security. Part 2: the model
Bibliographic Details
Main Authors:
Martin, Botha
,
Rossouw, von Solms
Format:
text
Language:
eng
Published:
Emerald
2002
Subjects:
Computer security,Methodology,Fuzzy logics
Holdings
Description
Similar Items
Staff View
Similar Items
The utilization of trend analysis in the effective monitoring of information security. Part 1: the concept
by: Martin, Botha, et al.
Published: (2001)
The information security management toolbox – taking the pain out of security management
by: Clive, Vermeulen, et al.
Published: (2002)
Information security management (1): why information security is so important
by: Rossouw, von Solms
Published: (1998)
Information security management: why standards are important
by: Rossouw, von Solms
Published: (1999)
Information security management (2): guidelines to the management of information technology security (GMITS)
by: Rossouw, von Solms
Published: (1998)
×
Loading...