共 50 条
- [1] Comprehensive Network Security Approach: Security Breaches at Retail company-A Case Study [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2012, 12 (08): : 107 - 112
- [2] Managing information security in a small IT-service company: A case study [J]. CHALLENGES OF INFORMATION TECHNOLOGY MANAGEMENT IN THE 21ST CENTURY, 2000, : 760 - 761
- [3] Security Fatigue: A Case Study of Data Specialists [J]. HUMAN ASPECTS OF INFORMATION SECURITY AND ASSURANCE, HAISA 2022, 2022, 658 : 275 - 284
- [4] DATA-SECURITY - THREATS TO COMPANY DATA ARE REAL BUT CONTROLLABLE [J]. POPULAR COMPUTING, 1984, 3 (07): : 65 - 68
- [5] Independent Security Testing on Agile Software Development: a Case Study in a Software Company [J]. PROCEEDINGS 10TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY ARES 2015, 2015, : 522 - 531
- [7] A Case Study of RFID Data Management in Steel Transform Company [J]. PICMET 2010: TECHNOLOGY MANAGEMENT FOR GLOBAL ECONOMIC GROWTH, 2010,
- [8] Moving Towards PCI DSS 3.0 Compliance: A Case Study of Credit Card Data Security Audit in an Online Payment Company [J]. 2014 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER SCIENCE AND INFORMATION SYSTEMS (ICACSIS), 2014, : 151 - 156
- [10] THE EVOLUTION OF THREATS TO COMPANY'S FINANCIAL SECURITY [J]. FINANCIAL AND CREDIT ACTIVITY-PROBLEMS OF THEORY AND PRACTICE, 2015, 1 (18): : 88 - 102