top of page
By accessing or using this site you accept and agree to our Terms and Conditions | As an Amazon Associate, we earn from qualifying purchases
Inside this Book

If you make use of this material, you may credit the authors as follows:
Harkins Malcolm W., "Managing Risk and Information Security: Protect to Enable (Second Edition)", Springer Nature, 2016, DOI: 10.1007/978-1-4842-1455-8, License: https://creativecommons.org/licenses/by/4.0/
Computer science
Keywords
Computer Science
Rights | License
Except where otherwise noted, this item has been published under the following license:
Takedown policy
If you believe that this publication infringes copyright, please contact us at info@jecasa-ltd.com and provide relevant details so that we can investigate your claim.
bottom of page