Martin Botha, Rossouw von Solms. The utilization of trend analysis in the effective monitoring of information security. Part 2: the model. Inf. Manag. Comput. Security, 10(1):5-11, 2002. [doi]
No references recorded for this publication.
No citations of this publication recorded.