Amanote Research

Amanote Research

    RegisterSign In

Security Policies and Procedures

doi 10.4018/978-1-59904-855-0.ch027
Full Text
Open PDF
Abstract

Available in full text

Date

January 1, 2009

Authors
Yvette Ghormley
Publisher

IGI Global


Related search

Enterprise Information Security Policies, Standards, and Procedures

2012English

Editorial Policies and Procedures

Animal Genetic Resources Information
2001English

Editorial Policies and Procedures

Animal Genetic Resources Information
2006English

Editorial Policies and Procedures

Animal Genetic Resources Information
2006English

Buffer Zone: Policies, Procedures, and Reality

Journal of Legal Aspects of Sport
2018English

On Quantitative Security Policies

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2011English

Composing Expressive Runtime Security Policies

ACM Transactions on Software Engineering and Methodology
Software
2009English

Trust-Based Enforcement of Security Policies

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2014English

Swiss Policies for More Food Security

SSRN Electronic Journal
2014English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy