Search alternatives:
table 3ay » table 3.1, table 3.2, table 3.4
table 3.3 » table 3.1, table 3.2, table 3.4
table 3 » table 1, table 2

1
by Brotby, W. Krag
Published 2013
CRC Press
Table of Contents: ... -- Introduction; Chapter 2 -- Why Measure Information Security?; Chapter 3 -- The Art and Science of Security...