Amanote Research
Register
Sign In
Security Policies and Procedures
doi 10.4018/978-1-59904-855-0.ch027
Full Text
Open PDF
Abstract
Available in
full text
Date
January 1, 2009
Authors
Yvette Ghormley
Publisher
IGI Global
Related search
Enterprise Information Security Policies, Standards, and Procedures
Editorial Policies and Procedures
Animal Genetic Resources Information
Editorial Policies and Procedures
Animal Genetic Resources Information
Editorial Policies and Procedures
Animal Genetic Resources Information
Buffer Zone: Policies, Procedures, and Reality
Journal of Legal Aspects of Sport
On Quantitative Security Policies
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Composing Expressive Runtime Security Policies
ACM Transactions on Software Engineering and Methodology
Software
Trust-Based Enforcement of Security Policies
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Swiss Policies for More Food Security
SSRN Electronic Journal