-
1
-
-
85023962837
-
Do the right thing' for continuous protection and network safety
-
October 7. http://www.com- puterworld.com/securitytopics/security/story/0,10801,96417,00. html
-
De Santis, J. (2004). –Do the right thing' for continuous protection and network safety.— Computerworld, October 7. http://www.com- puterworld.com/securitytopics/security/story/0,10801,96417,00. html
-
(2004)
Computerworld
-
-
De Santis, J.1
-
2
-
-
85024031323
-
How much security is enough?
-
March. http://cio-asia.com/ShowPage.aspx?pagetype=2& articleid=278&pubid=5&issueid=25
-
Ye, T.-S. and Hon, L.-W. (2005). How Much Security Is Enough? CIO Asia, March. http://cio-asia.com/ShowPage.aspx?pagetype=2& articleid=278&pubid=5&issueid=25
-
(2005)
-
-
Ye, T.-S.1
Hon, L.-W.2
-
3
-
-
57149133069
-
The critical success factor method: Establishing a foundation for enterprise security management
-
Richard A. Caralli et al., –The Critical Success Factor Method: Establishing a Foundation for Enterprise Security Management,— Carnegie Mellon University Software Engineering Institute, July 2004.
-
(2004)
Carnegie Mellon University Software Engineering Institute
-
-
Caralli, R.A.1
-
4
-
-
85024064850
-
Action-forcing mechanisms encourage policy compliance
-
April 14. http://searchsecurity. techtarget.com/tip/1,289483, sid14_gci959197,00.html
-
Wood, C. C. (2004). Action-forcing mechanisms encourage policy compliance. SearchSecurity.com, April 14. http://searchsecurity. techtarget.com/tip/1,289483, sid14_gci959197,00.html
-
(2004)
Searchsecurity.Com
-
-
Wood, C.C.1
-
5
-
-
84993099250
-
Implementing an information security awareness program
-
May/June
-
Peltier, T. R. (2005). Implementing an Information Security Awareness Program. Security Management Practices, May/June, p. 37.
-
(2005)
Security Management Practices
, pp. 37
-
-
Peltier, T.R.1
-
6
-
-
85024055619
-
Four ways to measure security success
-
March 22.9
-
Chapple, M. (2005). Four ways to measure security success. Search- Security, March 22.9.
-
(2005)
Search- Security
-
-
Chapple, M.1
-
7
-
-
85024026668
-
-
May 25. http://searchsecurity. techtarget.com/tip/1,289483, sid14_gci966036,00.html
-
Berg, A. (2004). Six key practices for a successful Interdepartmental security committee. SearchSecurity, May 25. http://searchsecurity. techtarget.com/tip/1,289483, sid14_gci966036,00.html
-
(2004)
Searchsecurity
-
-
Berg, A.1
-
8
-
-
53349117012
-
The future of security
-
December 15. http://www.cio.com/archive/121503/securityfuture.html
-
Berinato, S. (2003). The Future of Security. CIO Magazine, December 15. http://www.cio.com/archive/121503/securityfuture.html
-
(2003)
CIO Magazine
-
-
Berinato, S.1
-
9
-
-
85024036718
-
Study: Insider revenge often behind business cyberattacks
-
Vijayan, J. (2005). Study: Insider Revenge Often Behind Business Cyberattacks. Computerworld, May 23. http://www.computer- world.com/securitytopics/security/story/0,10801,101900,00.html
-
(2005)
-
-
Vijayan, J.1
-
10
-
-
85024023700
-
All the rage: Security spending not a solution to problems
-
March 7. http://www.nwc.secu- ritypipeline.com/trends/60401432
-
Vacca, J. R. (2005). All the Rage: Security Spending Not a Solution to Problems. Network Computing, March 7. http://www.nwc.secu- ritypipeline.com/trends/60401432.
-
(2005)
Network Computing
-
-
Vacca, J.R.1
-
11
-
-
85024021471
-
Addicted to security?
-
March 23. http://www.esecurityplanet.com/best_practices/article.php/ 3492251
-
Discini, S. (2005). Addicted to Security? eSecurity Planet, March 23. http://www.esecurityplanet.com/best_practices/article.php/ 3492251.
-
(2005)
Esecurity Planet
-
-
Discini, S.1
-
13
-
-
85024055611
-
Managing for enterprise security
-
http://www.cert.org/archive/pdf/04tn046.pdf
-
Richard A. Caralli et al., –Managing for Enterprise Security,— Carnegie Mellon University Software Engineering Institute, December 2004, p. 4. http://www.cert.org/archive/pdf/04tn046.pdf
-
(2004)
Carnegie Mellon University Software Engineering Institute
, pp. 4
-
-
Caralli, R.A.1
-
14
-
-
85023973727
-
Opinion: Security is a process, not an endpoint
-
May 5. http://www.securitypipeline. com/policy_privacy/162600266
-
Sweeney, T. (2005). Opinion: Security Is a Process, Not an Endpoint. Security Pipeline, May 5. http://www.securitypipeline. com/policy_privacy/162600266
-
(2005)
Security Pipeline
-
-
Sweeney, T.1
-
15
-
-
33750451548
-
Reducing enterprise risk with effective threat management
-
January/February
-
Drew, S. (2005). Reducing Enterprise Risk with Effective Threat Management. Information Security Management, January/February, p. 41.
-
(2005)
Information Security Management
, pp. 41
-
-
Drew, S.1
-
16
-
-
85024044307
-
Information security: Protecting critical assets in the new economy
-
April/May
-
Galletto, N. (2003). Information Security: Protecting Critical Assets in the New Economy. Government Purchasing Guide, April/May.
-
(2003)
Government Purchasing Guide
-
-
Galletto, N.1
-
17
-
-
85024019874
-
-
Drew, S. (2005). p. 41.
-
(2005)
, pp. 41
-
-
Drew, S.1
|