-
1
-
-
0003647686
-
-
Boyd & Fraser, Danvers, MA
-
Forcht, K.A., Computer Security Management, Boyd & Fraser, Danvers, MA, 1994, p. 296.
-
(1994)
Computer Security Management
, pp. 296
-
-
Forcht, K.A.1
-
2
-
-
84952223608
-
Hackers beware!
-
March
-
Butler, J., “Hackers beware!”, The EDP Audit, Control and Security Newsletter, Vol. XV No. 9, March 1988, pp. 6-8.
-
(1988)
The EDP Audit, Control and Security Newsletter
, vol.15
, Issue.9
, pp. 6-8
-
-
Butler, J.1
-
4
-
-
0027680124
-
A comparative framework for risk analysis methods
-
Eloff, J.H.P., Labuschagne, L. and Badenhorst, K.P., “A comparative framework for risk analysis methods”, Computers & Security, Vol. 12 No. 6, 1993, pp. 597-603.
-
(1993)
Computers & Security
, vol.12
, Issue.6
, pp. 597-603
-
-
Eloff, J.H.P.1
Labuschagne, L.2
Badenhorst, K.P.3
-
5
-
-
84986025069
-
Survey of computer aided risk analysis packages for computer security
-
DSV, Department of Computer and Systems Science, Stockholm University
-
Wahlgren, G., “Survey of computer aided risk analysis packages for computer security”, DSV, Department of Computer and Systems Science, Stockholm University, 1990.
-
(1990)
-
-
Wahlgren, G.1
-
6
-
-
0003872263
-
-
Macmillan, Basingstoke
-
Caelli, W., Longley, D. and Shain, M., Information Security Handbook, Macmillan, Basingstoke, 1991.
-
(1991)
Information Security Handbook
-
-
Caelli, W.1
Longley, D.2
Shain, M.3
-
7
-
-
84986125522
-
Risk management - a new approach
-
IFIP Conference, Elsevier Science Publishers, North-Holland
-
Clark, R., “Risk management - a new approach”, IFIP Conference, Elsevier Science Publishers, North-Holland, 1989, p. 423.
-
(1989)
, pp. 423
-
-
Clark, R.1
-
8
-
-
84986125520
-
Rapid development tools - one of 18 top technologies for reengineering
-
Winter 1995 7 cont. 58.
-
Currid, C., “Rapid development tools - one of 18 top technologies for reengineering”, Profiles Magazine, Winter 1995, pp. 6, 7 cont. 58.
-
Profiles Magazine
, pp. 6
-
-
Currid, C.1
-
10
-
-
30744472925
-
Principles and procedures of the LRAM approach to information systems risk analysis and management
-
Guarro, S.B., “Principles and procedures of the LRAM approach to information systems risk analysis and management”, Computers & Security, Vol. 6, 1987, pp. 493-504.
-
(1987)
Computers & Security
, vol.6
, pp. 493-504
-
-
Guarro, S.B.1
-
11
-
-
0038360978
-
-
Omneo, Essex Junction, VT
-
Hunt, D.V., Reengineering - Leveraging the Power of Integrated Product Development, Omneo, Essex Junction, VT, 1993, p. 14.
-
(1993)
Reengineering - Leveraging the Power of Integrated Product Development
, pp. 14
-
-
Hunt, D.V.1
-
13
-
-
0010685374
-
-
Wadsworth, Belmont, CA
-
Conger, S., The New Software Engineering, Wadsworth, Belmont, CA, 1994, p. 113.
-
(1994)
The New Software Engineering
, pp. 113
-
-
Conger, S.1
-
14
-
-
84986015813
-
A whole new way of thinking - business process re-engineering
-
March
-
Daniel, D., “A whole new way of thinking - business process re-engineering”, Computing Canada, Vol. 20 No. 7, March 1994, p. 17.
-
(1994)
Computing Canada
, vol.20
, Issue.7
, pp. 17
-
-
Daniel, D.1
|