This chapter describes how to implement an enterprise cybersecurity program. It discusses how to:
CITATION STYLE
Donaldson, S. E., Siegel, S. G., Williams, C. K., & Aslam, A. (2015). Implementing Enterprise Cybersecurity. In Enterprise Cybersecurity (pp. 71–86). Apress. https://doi.org/10.1007/978-1-4302-6083-7_4
Mendeley helps you to discover research relevant for your work.