skip to main content
Skip header Section
Managing Cybersecurity Resources (The Mcgraw-Hill Homeland Security Series)December 2005
Publisher:
  • McGraw-Hill Pub. Co.
ISBN:978-0-07-145285-4
Published:01 December 2005
Skip Bibliometrics Section
Bibliometrics
Abstract

No abstract available.

Cited By

  1. (2017). Introducing cybernomics, Computers and Security, 65:C, (77-89), Online publication date: 1-Mar-2017.
  2. Caulfield T and Pym D Modelling and simulating systems security policy Proceedings of the 8th International Conference on Simulation Tools and Techniques, (9-18)
  3. Krautsevich L, Martinelli F and Yautsiukhin A Formal analysis of security metrics and risk Proceedings of the 5th IFIP WG 11.2 international conference on Information security theory and practice: security and privacy of mobile devices in wireless communication, (304-319)
  4. Krautsevich L, Lazouski A, Martinelli F and Yautsiukhin A Influence of attribute freshness on decision making in usage control Proceedings of the 6th international conference on Security and trust management, (35-50)
  5. ACM
    Massacci F and Nguyen V Which is the right source for vulnerability studies? Proceedings of the 6th International Workshop on Security Measurements and Metrics, (1-8)
  6. ACM
    Beautement A, Sasse M and Wonham M The compliance budget Proceedings of the 2008 New Security Paradigms Workshop, (47-58)
  7. ACM
    Bodin L, Gordon L and Loeb M (2008). Information security and risk management, Communications of the ACM, 51:4, (64-68), Online publication date: 1-Apr-2008.
  8. Klempt P, Schmidpeter H, Sowa S and Tsinas L Business oriented information security management Proceedings of the 2007 OTM confederated international conference on On the move to meaningful internet systems: CoopIS, DOA, ODBASE, GADA, and IS - Volume Part II, (1835-1852)
  9. Sveen F, Torres J and Sarriegi J Learning from your elders Proceedings of the 26th international conference on Computer Safety, Reliability, and Security, (224-237)
  10. Wu Q, Zhang H and Pu J Mitigating distributed denial-of-service attacks using network connection control charts Proceedings of the 2nd international conference on Scalable information systems, (1-4)
  11. Torres J, Sarriegi J, Santos J and Serrano N Managing information systems security Proceedings of the 9th international conference on Information Security, (530-545)
Contributors
  • Robert H. Smith School of Business
  • Robert H. Smith School of Business

Recommendations