Search alternatives:
securite » security, secure

1
by Al Hour, Abdullah
Published 2012
IT Governance Pub.
Table of Contents: ... the BCM Program; Gathering key success factors; Establishing the governance model; Establishing the BCM...