-
2
-
-
0345302810
-
-
COBIT; ISACA, Rolling Meadows, IL
-
COBIT (1998), COBIT: Control Objectives, ISACA, Rolling Meadows, IL.
-
(1998)
COBIT: Control Objectives
-
-
-
3
-
-
84935322454
-
Alternative forms of fit in contingency theory
-
Drazin, R. and Van de Ven, A.H. (1985), "Alternative forms of fit in contingency theory", Administrative Science Quarterly, Vol. 30 No. 4, pp. 514-39.
-
(1985)
Administrative Science Quarterly
, vol.30
, Issue.4
, pp. 514-539
-
-
Drazin, R.1
Van De Ven, A.H.2
-
4
-
-
0034516080
-
Information security management: An approach to combine process certification and product evaluation
-
Eloff, M.M. and Solms, S.H.V. (2000), "Information security management: an approach to combine process certification and product evaluation", Computers & Security, Vol. 19 No. 3, pp. 698-709.
-
(2000)
Computers & Security
, vol.19
, Issue.3
, pp. 698-709
-
-
Eloff, M.M.1
Solms, S.H.V.2
-
5
-
-
0003395981
-
-
American Management Association, New York, NY
-
Flynn, N.L. (2001), The Epolicy Handbook: Designing and Implementing Effective E-mail, Internet and Software Policies, American Management Association, New York, NY.
-
(2001)
The Epolicy Handbook: Designing and Implementing Effective E-mail, Internet and Software Policies
-
-
Flynn, N.L.1
-
6
-
-
0004256091
-
-
John Wiley & Sons, New York, NY
-
Gollmann, D. (1999), Computer Security, John Wiley & Sons, New York, NY.
-
(1999)
Computer Security
-
-
Gollmann, D.1
-
7
-
-
35048850098
-
The experimental analysis of information security management issues for online financial services
-
Gupta, M., Charturvedi, A.R., Metha, S. and Valeri, L. (2001), "The experimental analysis of information security management issues for online financial services", ICIS 2000, pp. 667-75.
-
(2001)
ICIS 2000
, pp. 667-675
-
-
Gupta, M.1
Charturvedi, A.R.2
Metha, S.3
Valeri, L.4
-
11
-
-
0020185645
-
A management science approach to contingency models of organizational structure
-
Lee, S.M., Luthans, F. and Olson, D.L. (1982), "A management science approach to contingency models of organizational structure", Academy of Management Journal, Vol. 25 No. 3, pp. 553-66.
-
(1982)
Academy of Management Journal
, vol.25
, Issue.3
, pp. 553-566
-
-
Lee, S.M.1
Luthans, F.2
Olson, D.L.3
-
13
-
-
0034955243
-
Extending the risk analysis model to include market insurance
-
Reid, R.C. and Floyd, S.A. (2001), "Extending the risk analysis model to include market insurance", Computers & Security, Vol. 20 No. 4, pp. 331-9.
-
(2001)
Computers & Security
, vol.20
, Issue.4
, pp. 331-339
-
-
Reid, R.C.1
Floyd, S.A.2
-
14
-
-
0004171318
-
-
Prentice-Hall, Upper Saddle River, NJ
-
Robbins, S.P. (1994), Management, 4th ed., Prentice-Hall, Upper Saddle River, NJ.
-
(1994)
Management, 4th Ed.
-
-
Robbins, S.P.1
-
15
-
-
0035149763
-
Usability and security: An appraisal of usability issues in information security methods
-
Schultz, E.E., Proctor, R.W. and Lien, M.C. (2001), "Usability and security: an appraisal of usability issues in information security methods", Computers & Security, Vol. 20 No. 18, pp. 620-34.
-
(2001)
Computers & Security
, vol.20
, Issue.18
, pp. 620-634
-
-
Schultz, E.E.1
Proctor, R.W.2
Lien, M.C.3
-
16
-
-
0344439808
-
SALSA: A method for developing the enterprise security architecture and strategy
-
Sherwood, J. (1996), "SALSA: a method for developing the enterprise security architecture and strategy", Computers & Security, Vol. 2, pp. 8-17.
-
(1996)
Computers & Security
, vol.2
, pp. 8-17
-
-
Sherwood, J.1
-
17
-
-
0345302807
-
-
O'Reilly & Associates, Sebastopol, CA
-
Simson, G. and Gene, S. (1991), Practical UNIX Security, O'Reilly & Associates, Sebastopol, CA.
-
(1991)
Practical UNIX Security
-
-
Simson, G.1
Gene, S.2
-
18
-
-
0003538232
-
Computer security - Threats, vulnerabilities and countermeasures
-
Smith, M. (1989), "Computer security - threats, vulnerabilities and countermeasures", Information Age, Vol. 11 No. 4, pp. 205-10.
-
(1989)
Information Age
, vol.11
, Issue.4
, pp. 205-210
-
-
Smith, M.1
-
20
-
-
0141917862
-
A framework for information security evaluation
-
Von Solms, R., Van Haar, H., Von Solms, S.H. and Caelli, W.J. (1994), "A framework for information security evaluation", Information & Management, Vol. 26, No. 3, pp. 143-53.
-
(1994)
Information & Management
, vol.26
, Issue.3
, pp. 143-153
-
-
Von Solms, R.1
Van Haar, H.2
Von Solms, S.H.3
Caelli, W.J.4
-
22
-
-
0141883323
-
Third generation risk management practices
-
Wright, M. (1999), "Third generation risk management practices", Computers & Security, Vol. 1999 No. 2, pp. 9-12.
-
(1999)
Computers & Security
, vol.1999
, Issue.2
, pp. 9-12
-
-
Wright, M.1
|