Showing 1 - 1 of 1
Many methodologies exist to assess the security risks associated with unauthorized leakage, modification and interruption of information for a given organisation. We argue that the traditional orientation of these methodologies, towards the identification and assessment of technical information...
Persistent link: https://www.econbiz.de/10009484051