top of page
Inside this Book

If you make use of this material, you may credit the authors as follows:
Harkins Malcolm W., "Managing Risk and Information Security: Protect to Enable (Second Edition)", Springer Nature, 2016, DOI: 10.1007/978-1-4842-1455-8, License: https://creativecommons.org/licenses/by/4.0/
Computer science
Keywords
Computer Science
Rights | License
Except where otherwise noted, this item has been published under the following license:
You might also be interested in the following books from Amazon:
Takedown policy:
If you believe that this publication infringes copyright, please contact us at info@jecasa-ltd.com and provide relevant details so that we can investigate your claim.
bottom of page



















