1 |
공공기관 취약성 분석·평가 체계
/
[
박현동;정윤정;이철원
] /
국가보안기술연구소 기술문서
|
2 |
Dynamic Corporate Culture Lies at the Heart of Effective Security Strategy
/
[
Clifford May
] /
Computer Fraud & Security
|
3 |
Information Security Policy-What Do International Information Security Standards Say
/
[
Hone,K.;Eloff,J.H.P.
] /
Computers and Security
|
4 |
Computer Crimes: Theorizing about the Enemy within
/
[
Dhillon,G.;Moores,S.
] /
Computers and Security
|
5 |
From Risk Analysis to Security Requirements
/
[
Gerber,M.;Von Solms.R.
] /
Computers and Security
|
6 |
/
[
Alberts;Christopher J.Behrens;Sandra G.Pethia;Richard D.Wilson
] /
Operationally Critical Threat, Asset. and Vulnerability Evaluation(OCTAVE) Framework. Version1.0
|
7 |
인트라넷 취약점 분석·평가 방법론 연구
/
[
서정택;정윤정;임을규;김인중;이철원
] /
한국정보과학회 춘계학술대회논문집(A)
|