-
1
-
-
0003543183
-
Valuation, Measuring and Managing the value of companies
-
second edition, John Wiley & Sons, Inc
-
T. Copeland, T. Koller, and J. Murrin, Valuation, Measuring and Managing the value of companies, second edition, McKinsey & Company, Inc. (John Wiley & Sons, Inc, 1995).
-
(1995)
McKinsey & Company, Inc
-
-
Copeland, T.1
Koller, T.2
Murrin, J.3
-
2
-
-
36248987685
-
-
Davies FT Financial Publishing, Pearson Professional Limited, London
-
J. McTaggart, P. Kontes, M. Mankins, in: Shareholder Value, I. Cornelius and M. Davies (FT Financial Publishing, Pearson Professional Limited, London, 1997), p. 223.
-
(1997)
Shareholder Value, I. Cornelius and M
, pp. 223
-
-
McTaggart, J.1
Kontes, P.2
Mankins, M.3
-
3
-
-
36249030480
-
-
C. Alberts and A. Dorofee, Managing Information Security Risks, The OCTAVE Approach, Carnegie Mellon Software Engineering Institute, USA (Addison Wesley, 2003).
-
C. Alberts and A. Dorofee, Managing Information Security Risks, The OCTAVE Approach, Carnegie Mellon Software Engineering Institute, USA (Addison Wesley, 2003).
-
-
-
-
5
-
-
3042812983
-
The 10 deadly sins of information security management
-
ISSN 0167 -4048
-
B. V. Solms and R. V. Solms, The 10 deadly sins of information security management, in: Computers & Security, Vol.23 No 5 (ISSN 0167 -4048, 2004), pp. 371-376.
-
(2004)
Computers & Security
, vol.23
, Issue.5
, pp. 371-376
-
-
Solms, B.V.1
Solms, R.V.2
-
6
-
-
36248933604
-
Tactical level - an overview of the latest trends in risk analysis, certification, best practices and international standards
-
Fribourg, Switzerland, February
-
J.H.P. Eloff, Tactical level - an overview of the latest trends in risk analysis, certification, best practices and international standards. Information Security Architectures Workshop, Fribourg, Switzerland, February 2002.
-
(2002)
Information Security Architectures Workshop
-
-
Eloff, J.H.P.1
-
7
-
-
36249012487
-
-
P.A. David, The Dynamo and the Computer: An Historical Perspective on the Modern Productivity Paradox, (American Economic Review, 1990).
-
P.A. David, The Dynamo and the Computer: An Historical Perspective on the Modern Productivity Paradox, (American Economic Review, 1990).
-
-
-
-
10
-
-
2142852379
-
Cost-Benefit Analysis for Network Intrusion Detection, Centre for Secure and Dependable Software, University of Idaho
-
October
-
H. Wei, D. Frinke, O. Carter, and C. Ritter Wei, Cost-Benefit Analysis for Network Intrusion Detection, Centre for Secure and Dependable Software, University of Idaho, Proceedings of the 28th Annual Computer Security Conference October, 2001.
-
(2001)
Proceedings of the 28th Annual Computer Security Conference
-
-
Wei, H.1
Frinke, D.2
Carter, O.3
Ritter Wei, C.4
-
11
-
-
36248970070
-
-
K.J. Soo Hoo, A.W. Sudbury, A.R. Jaquith, Tangible ROI through Secure Software Engineering (Secure Business Quarterly, 4th Quarter 2001).
-
K.J. Soo Hoo, A.W. Sudbury, A.R. Jaquith, Tangible ROI through Secure Software Engineering (Secure Business Quarterly, 4th Quarter 2001).
-
-
-
-
12
-
-
36248935119
-
-
The CERT® Coordination Center April 30
-
The CERT® Coordination Center (April 30, 2003); http://www.cert.org.
-
(2003)
-
-
-
13
-
-
36249020356
-
-
S.D. Moitra and S.L. Konda, A Simulation Model for Managing Survivability of Networked Information Systems, Technical Report CMU/ SEI-2000-TR-020, Carnegie Mellon Software Engineering Institute, 2000.
-
S.D. Moitra and S.L. Konda, A Simulation Model for Managing Survivability of Networked Information Systems, Technical Report CMU/ SEI-2000-TR-020, Carnegie Mellon Software Engineering Institute, 2000.
-
-
-
-
14
-
-
36249016798
-
-
D.W. Straub and R.J. Welke, Coping With Systems Risk: Security Planning Models for Management Decision Making (MIS Quarterly, December 1998).
-
D.W. Straub and R.J. Welke, Coping With Systems Risk: Security Planning Models for Management Decision Making (MIS Quarterly, December 1998).
-
-
-
-
15
-
-
34249853217
-
A, and D. Lynas
-
CMP Books, USA
-
J. Sherwood, A. Clark, A, and D. Lynas., Enterprise Security Architecture: A business driven approach (CMP Books, USA, 2005).
-
(2005)
Enterprise Security Architecture: A business driven approach
-
-
Sherwood, J.1
Clark, A.2
-
16
-
-
33750949223
-
-
M. K. Nalla, K. Christian, M. Morash, and P. Schram, Practitioners' perceptions of graduate curriculum in security education (Security Journal, 6, 1995), pp. 93-99.
-
M. K. Nalla, K. Christian, M. Morash, and P. Schram, Practitioners' perceptions of graduate curriculum in security education (Security Journal, 6, 1995), pp. 93-99.
-
-
-
-
17
-
-
0042930292
-
Computer security in these uncertain times: The need for a new approach
-
London, UK
-
I. O. Angell, Computer security in these uncertain times: The need for a new approach. Proceedings of the Tent World Conference on Computer Security, Audit and Control, COMPSEC, London, UK, 1993, pp. 382-388.
-
(1993)
Proceedings of the Tent World Conference on Computer Security, Audit and Control, COMPSEC
, pp. 382-388
-
-
Angell, I.O.1
-
18
-
-
36249014802
-
-
Eleventh Annual CSI/FBI Computer Crime and Security Survey, Computer Security Institute
-
Eleventh Annual CSI/FBI Computer Crime and Security Survey, Computer Security Institute, 2006; www.gocsi.com.
-
(2006)
-
-
|