Threat Analysis and Compliance

  • Carter P
N/ACitations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

… -terrorism and modern warfare through to industrial espionage, the “geek” factor, organized … In the following sections, we will glance at SOX compliance and GDPR, as well what impact …

Cite

CITATION STYLE

APA

Carter, P. A. (2018). Threat Analysis and Compliance. In Securing SQL Server (pp. 3–21). Apress. https://doi.org/10.1007/978-1-4842-4161-5_1

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free