共 50 条
- [1] Implementation of an Information Systems Security Policy: Action Research [J]. PROCEEDINGS OF THE 13TH EUROPEAN CONFERENCE ON RESEARCH METHODOLOGY FOR BUSINESS AND MANAGEMENT STUDIES (ECRM 2014), 2014, : 244 - 252
- [4] Research in Analysis IT Security Policy and Security Solution [J]. 2019 2ND INTERNATIONAL CONFERENCE ON MECHANICAL, ELECTRONIC AND ENGINEERING TECHNOLOGY (MEET 2019), 2019, : 180 - 184
- [7] Analysis of network security requirement and security policy research [J]. 2000, Shanghai Comp Soc, China (26):
- [8] Reliable process for security policy deployment [J]. SECRYPT 2007: PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2007, : 5 - +
- [9] Policy action regarding security deficiencies on the Internet [J]. IDP-INTERNET LAW AND POLITICS, 2006, (02):