Zobrazeno 1 - 10
of 10
pro vyhledávání: '"Will Ozier"'
Autor:
Will Ozier
Publikováno v:
EDPACS. 30:11-19
The increasing demand that organizations explicitly identify and manage risk also increases the demand for efficient, credible, and cost-effective tools. These tools must enable the user to perform risk analysis and assessment in a timely manner. The
Autor:
Will Ozier
Publikováno v:
Computers & Security. 17:14-18
Autor:
Will Ozier
Publikováno v:
Encyclopedia of Information Assurance
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::96e8a4ff2dea51365dbb32fff7e6baf5
https://doi.org/10.1081/e-eia-120046891
https://doi.org/10.1081/e-eia-120046891
Autor:
Will Ozier
Publikováno v:
Encyclopedia of Information Assurance
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::c487b16373104e793395e3819bbcd918
https://doi.org/10.1081/e-eia-120046890
https://doi.org/10.1081/e-eia-120046890
Autor:
Will Ozier
Publikováno v:
Information Systems Security. 7:1-3
Autor:
Debra Herrmann, Ben Rothke, Robert Slade, Ralph Spencer Poore, Jeff Davis, Todd Fitzgerald, Stephen Fried, Jeff Misrahi, Brian Geffert, Carl Endorf, Jeffrey Davis, Ken Shaurette, Kevin Henry, Ken Buszta, Louis Fried, William Stallings, Mollie Krehnke, David Krehnke, Jim Appleyard, Will Ozier, Sean Price, George McBride, Carl Jackson, Mark Carey, Ray Kaplan, Daniel Houser, Brett Regan Young, Duane Sharp, Matunda Nyanchama, Anna Wilson, Ralph Kliem, Sudhanshu Kairab, Brian Schultz, Carol Siegel, Ty Sagalow, Paul Serritella, John Wylder, Patrick Howard, Felicia Nicastro, Rebecca Herold, Robert Martin, Steven Christey, David Baker, Carl Burney, Jeffrey Fenton, James Wolfe, William Hugh Murray, Ed Skoudis, Edward Freeman, Brian Shorten, Chris Hare, Jon David, Sam Chun, Timothy Stacey, Tom Peltier, William Tompkins, Susan Hansche, Stan Stahl, Charles Hudson, Thomas Bray, Sanford Sherizen, William Boni, Laurie Hill McQuillan, Michael Corby, James Tiller
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::77153672f6a1e28bb97406a198d1cabd
https://doi.org/10.1201/noe0849385858.ch3
https://doi.org/10.1201/noe0849385858.ch3
Autor:
Will Ozier
Publikováno v:
Computer Fraud & Security Bulletin. 11:10-13
Periodical
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.