Academic literature on the topic 'Security risk management approach'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Security risk management approach.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Security risk management approach"

1

Musman, Scott, and Andrew Turner. "A game theoretic approach to cyber security risk management." Journal of Defense Modeling and Simulation: Applications, Methodology, Technology 15, no. 2 (2017): 127–46. http://dx.doi.org/10.1177/1548512917699724.

Full text
Abstract:
This paper describes the Cyber Security Game (CSG). Cyber Security Game is a method that has been implemented in software that quantitatively identifies cyber security risks and uses this metric to determine the optimal employment of security methods for any given investment level. Cyber Security Game maximizes a system’s ability to operate in today’s contested cyber environment by minimizing its mission risk. The risk score is calculated by using a mission impact model to compute the consequences of cyber incidents and combining that with the likelihood that attacks will succeed. The likeliho
APA, Harvard, Vancouver, ISO, and other styles
2

Petrescu, Anca Gabriela. "Management Approach of Risk Analysis in Information Security." International Journal of Innovation in the Digital Economy 9, no. 3 (2018): 13–26. http://dx.doi.org/10.4018/ijide.2018070102.

Full text
Abstract:
This article describes how the ease of access to information and communication technologies is practically a prerequisite for the functioning of modern society. Taking the competitive market into consideration, the protection of the information infrastructure for a company, could mean that company has a competitive advantage. This article is relevant to better understand how the actors involved in information and communication technologies could develop new models of information systems and risk management strategies. The results of this research show that each manager must handle threats, bec
APA, Harvard, Vancouver, ISO, and other styles
3

Warren, M., and W. Hutchinson. "A security risk management approach for e‐commerce." Information Management & Computer Security 11, no. 5 (2003): 238–42. http://dx.doi.org/10.1108/09685220310509028.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Bell, Sandra. "The UK's Risk Management Approach to National Security." RUSI Journal 152, no. 3 (2007): 18–23. http://dx.doi.org/10.1080/03071840701472265.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Anton, Nicolae, and Anişor Nedelcu. "Security risk analysis and management." MATEC Web of Conferences 178 (2018): 08015. http://dx.doi.org/10.1051/matecconf/201817808015.

Full text
Abstract:
The management system of informational security is a part of the management system of an organization, that approaches the management of risk from the point of view of the involved information, approach that is used in order to set, to implement, to function, to monitor, to revise, to maintain and to improve the informational security at the organizational level, referring to the progress of the processes required by the management of risk in order to guarantee the security of the information. The appreciation of the efficiency of the security system represents a difficult problem and it conta
APA, Harvard, Vancouver, ISO, and other styles
6

Janssen, Stef, Alexei Sharpanskykh, and Richard Curran. "AbSRiM: An Agent‐Based Security Risk Management Approach for Airport Operations." Risk Analysis 39, no. 7 (2019): 1582–96. http://dx.doi.org/10.1111/risa.13278.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Bojanc, Rok, and Borka Jerman-Blažič. "An economic modelling approach to information security risk management." International Journal of Information Management 28, no. 5 (2008): 413–22. http://dx.doi.org/10.1016/j.ijinfomgt.2008.02.002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Wahlgren, Gunnar, and Stewart Kowalski. "IT Security Risk Management Model for Cloud Computing." International Journal of E-Entrepreneurship and Innovation 4, no. 4 (2013): 1–19. http://dx.doi.org/10.4018/ijeei.2013100101.

Full text
Abstract:
The authors combined ISO 27005 framework for IT Security Risk Management with NIST Multitier framework. With this combined framework the authors create a new approach to IT Security Risk Management where IT Security Risk Management is place at the strategic, tactical and operational levels of an organizational. In this paper the authors concentrate on the monitoring and communication steps of IT Security Risk Management and especially escalation of new IT Security Incidents. The authors present a first draft to an IT Security Risk Escalation Capability Maturity Model based on ISACA´s Risk IT F
APA, Harvard, Vancouver, ISO, and other styles
9

Kralik, Lukas, Roman Senkerik, and Roman Jasek. "Model for comprehensive approach to security management." International Journal of System Assurance Engineering and Management 7, no. 2 (2016): 129–37. http://dx.doi.org/10.1007/s13198-016-0420-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Ghadge, Abhijeet, Xie Fang, Samir Dani, and Jiju Antony. "Supply chain risk assessment approach for process quality risks." International Journal of Quality & Reliability Management 34, no. 7 (2017): 940–54. http://dx.doi.org/10.1108/ijqrm-01-2015-0010.

Full text
Abstract:
Purpose The purpose of this paper is to proactively analyse and mitigate the root causes of the product and security risks. The case study approach examines the effectiveness of the fuzzy logic approach for assessing the product and process-related failure modes within global supply chain context. Design/methodology/approach The case study of a Printed Circuit Board Company in China is used as a platform for conducting the research. Using data triangulation, the data are collected and analyzed through interviews, questionnaires, expert opinions and quantitative modelling for some interesting i
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Security risk management approach"

1

Consolini, Todd. "Regional security assessments a strategic approach to securing federal facilities /." Thesis, Monterey, California : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/Dec/09Dec%5FConsolini.pdf.

Full text
Abstract:
Thesis (M.A. in Security Studies (Homeland Security and Defense))--Naval Postgraduate School, December 2009.<br>Thesis Advisor(s): Rollins, John. Second Reader: Darken, Rudy. "December 2009." Description based on title screen as viewed on January 26, 2010. Author(s) subject terms: Federal Protective Service, policy option analysis, critical infrastructure and key resources (CI/KR), interdependency, facility security level, government facilities sector, National Infrastructure Protection Plan (NIPP), risk management. Includes bibliographical references (p. 81-83). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
2

Homer, John. "A comprehensive approach to enterprise network security management." Diss., Manhattan, Kan. : Kansas State University, 2009. http://hdl.handle.net/2097/1372.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Carlsson, Elin, and Moa Mattsson. "The MaRiQ model: A quantitative approach to risk management." Thesis, Uppsala universitet, Avdelningen för datalogi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-385257.

Full text
Abstract:
In recent years, cyber attacks and data fraud have become major issues to companies, businesses and nation states alike. The need for more accurate and reliable risk management models is therefore substantial. Today, cybersecurity risk management is often carried out on a qualitative basis, where risks are evaluated to a predefined set of categories such as low, medium or high. This thesis aims to challenge that practice, by presenting a model that quantitatively assesses risks - therefore named MaRiQ (Manage Risks Quantitatively). MaRiQ was developed based on collected requirements and contem
APA, Harvard, Vancouver, ISO, and other styles
4

Fagade, Tesleem. "A multi-domain approach for security compliance, insider threat modelling and risk management." Thesis, University of Bristol, 2018. http://hdl.handle.net/1983/c7461605-6493-4413-8835-65847df90a57.

Full text
Abstract:
Information security is fundamentally concerned with the confidentiality, integrity and availability of information assets at all times. However, given the ubiquitous nature of information systems and organisations’ growing reliance on large-scale interconnected networks;, it means that the prevalence and impact of cyber-attacks will continue to rise. The problem of cybersecurity risks management in corporate organisations is non-trivial, hence, constructing tools that truly satisfy the holistic management of information security is difficult and not readily available. The work described in th
APA, Harvard, Vancouver, ISO, and other styles
5

Kailay, Muninder Pal. "A qualitative approach to computer security risk analysis and management for the commercial sector." Thesis, University of Birmingham, 1995. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.487431.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Jackson, David P. "Intelligence-led risk management for homeland security: a collaborative approach for a common goal." Monterey, California. Naval Postgraduate School, 2011. http://hdl.handle.net/10945/10624.

Full text
Abstract:
CHDS State/Local<br>The concept of risk management provides the foundation of the homeland security enterprise. The United States of America faces numerous complex risks ranging from a series of natural hazards, pandemic disease, technological hazards, transnational criminal enterprises and acts of terrorism perpetrated by intelligent adversaries. The management of these risks requires a strategic collaborative effort from the intelligence and risk analysis communities and many stakeholders at all levels of government, including the private sector. Paradoxically, a decentralized collaborative
APA, Harvard, Vancouver, ISO, and other styles
7

Briouig, Mohamed. "Risk management in liquefied natural gas ports and marine terminals supply chains." Thesis, University of Plymouth, 2014. http://hdl.handle.net/10026.1/3013.

Full text
Abstract:
Due to its environmental attributes, Liquefied Natural Gas (LNG) as a clean fossil fuel source of energy has witnessed a steady increase in demand worldwide over the last decade. This increase is mainly attributed to higher demand from the power generation sector as well as from domestic and industrial usages .This growing role of LNG among competing energy sources has raised concerns over the safety and security of the LNG chain of production, transport and distribution and its related infrastructure. Within this context, LNG ports and marine terminals, being strategically located at the mids
APA, Harvard, Vancouver, ISO, and other styles
8

Lundberg, Johan. "Dynamic Risk Management in Information Security : A socio-technical approach to mitigate cyber threats in the financial sector." Thesis, Örebro universitet, Handelshögskolan vid Örebro Universitet, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:oru:diva-87359.

Full text
Abstract:
In the last decade, a new wave of socio-technical cyber threats has emerged that is targeting both the technical and social vulnerabilities of organizations and requires fast and efficient threat mitigations. Yet, it is still common that financial organizations rely on yearly reviewed risk management methodologies that are slow and static to mitigate the ever-changing cyber threats. The purpose of this research is to explore the field of Dynamic Risk Management in Information Security from a socio-technical perspective in order to mitigate both types of threats faster and dynamically to better
APA, Harvard, Vancouver, ISO, and other styles
9

Hart, Jeremy. "A systems-based approach to integrating security risk management into the management practice & culture of a global multi-national organisation." Thesis, Middlesex University, 2018. http://eprints.mdx.ac.uk/25956/.

Full text
Abstract:
I work in the Corporate Security department of a global multi-national company that operates a wide range of businesses in many complex and turbulent environments, including developing countries and those recovering from conflict or similar strife. To help deliver the best level of protection for people, assets and business processes, my project sought to find an innovative, cost-effective and non-disruptive approach to integrating security risk management into the mainstream management practice and culture of my organisation. The solution needed to be responsive both to global corporate polic
APA, Harvard, Vancouver, ISO, and other styles
10

Salim, Hamid M. "Cyber safety : a systems thinking and systems theory approach to managing cyber security risks." Thesis, Massachusetts Institute of Technology, 2014. http://hdl.handle.net/1721.1/90804.

Full text
Abstract:
Thesis: S.M. in Engineering and Management, Massachusetts Institute of Technology, Engineering Systems Division, System Design and Management Program, 2014.<br>Thesis: S.M., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2014.<br>93<br>Cataloged from PDF version of thesis.<br>Includes bibliographical references (pages 148-156).<br>If we are to manage cyber security risks more effectively in today's complex and dynamic Web 2.0 environment, then a new way of thinking is needed to complement traditional approaches. According to Symantec's 2014 In
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Security risk management approach"

1

Simulating security returns: A filtered historical simulation approach. Palgrave Pivot, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

J, Dorofee Audrey, ed. Managing information security risks: The OCTAVE approach. Addison-Wesley, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Foundation, Information Systems Audit and Control. Risks of customer relationship management: A security, control, and audit approach. Information Systems Audit and Control Foundation, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kailay, Muninder Pal. A qualitative approach to computer security risk analysis and management for the commercial sector. University of Birmingham, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Partnering with the private sector to secure critical infrastructure: Has the Department of Homeland Security abandoned the resilience-based approach? : hearing before the Subcommittee on Transportation Security and Infrastructure Protection of the Committee on Homeland Security, House of Representatives, One Hundred Tenth Congress, second session, May 14, 2008. U.S. G.P.O., 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Palmer, I. C. Computer security risk management. Jessica Kingsley, in association with the Control Risks Group, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

A, Potter G., ed. Computer security risk management. Van Nostrand Reinhold, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Klipper, Sebastian. Information Security Risk Management. Springer Fachmedien Wiesbaden, 2015. http://dx.doi.org/10.1007/978-3-658-08774-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Blyth, Michael, ed. Risk and Security Management. John Wiley & Sons, Inc., 2012. http://dx.doi.org/10.1002/9780470387283.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Klipper, Sebastian. Information Security Risk Management. Vieweg+Teubner, 2011. http://dx.doi.org/10.1007/978-3-8348-9870-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Security risk management approach"

1

Chopra, Abhishek, and Mukund Chaudhary. "Risk Management Approach." In Implementing an Information Security Management System. Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-5413-4_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Bishop, Matt, Sophie Engle, Deborah A. Frincke, et al. "A Risk Management Approach to the “Insider Threat”." In Insider Threats in Cyber Security. Springer US, 2010. http://dx.doi.org/10.1007/978-1-4419-7133-3_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Izvarina, Nataliya, Dmitriy Filev, and Anguelina Tepegendjiyan. "RISK-BASED AUDIT." In Business security management in modern conditions. AUS PUBLISHERS, 2021. http://dx.doi.org/10.26526/chapter_60258635832a26.81416335.

Full text
Abstract:
The article discusses the features of building an internal audit system for the economic security of an enterprise. Special emphasis is placed on a risk-based approach to internal audit. A flowchart of the risk-based approach is proposed in which its main advantages are written. Ways to solve emerging problems in the field of internal audit are also suggested.
APA, Harvard, Vancouver, ISO, and other styles
4

Paul, Stéphane, and Paul Varela. "Poster Support for an Obeya-Like Risk Management Approach." In Graphical Models for Security. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-36537-0_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Schauer, Stefan. "A Risk Management Approach for Highly Interconnected Networks." In Game Theory for Security and Risk Management. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-75268-6_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Li, Xichun, Mahmoud Al-Shawabkeh, and Zhiyuan Li. "Security Risk Management Approach for Improving Information Security Return of Investment." In Recent Developments in Data Science and Business Analytics. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-72745-5_22.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Van Herreweghen, Els. "A Risk-Driven Approach to Designing Privacy-Enhanced Secure Applications." In Information Security Management, Education and Privacy. Springer US, 2004. http://dx.doi.org/10.1007/1-4020-8145-6_21.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kamhoua, Charles A., Luke Kwiat, Kevin A. Kwiat, Joon S. Park, Ming Zhao, and Manuel Rodriguez. "Security and Interdependency in a Public Cloud: A Game-Theoretic Approach." In Game Theory for Security and Risk Management. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-75268-6_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Rajbhandari, Lisa, and Einar Arthur Snekkenes. "Mapping between Classical Risk Management and Game Theoretical Approaches." In Communications and Multimedia Security. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-24712-5_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Raptis, Dimitris, Theo Dimitrakos, Bjørn Axel Gran, and Ketil Stølen. "The Coras Approach for Model-Based Risk Management Applied to E-Commerce Domain." In Advanced Communications and Multimedia Security. Springer US, 2002. http://dx.doi.org/10.1007/978-0-387-35612-9_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Security risk management approach"

1

Mahopo, Bessy, Hanifa Abdullah, and Mathias Mujinga. "A formal qualitative risk management approach for IT security." In 2015 Information Security for South Africa (ISSA). IEEE, 2015. http://dx.doi.org/10.1109/issa.2015.7335053.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Datta Ray, Partha, Rajgopal Harnoor, and Mariana Hentea. "Smart power grid security: A unified risk management approach." In 2010 IEEE International Carnahan Conference on Security Technology (ICCST). IEEE, 2010. http://dx.doi.org/10.1109/ccst.2010.5678681.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Naudet, Yannick, Nicolas Mayer, and Christophe Feltus. "Towards a Systemic Approach for Information Security Risk Management." In 2016 11th International Conference on Availability, Reliability and Security (ARES ). IEEE, 2016. http://dx.doi.org/10.1109/ares.2016.76.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Dorca, Vasile, Radu Munteanu, Sorin Popescu, Adrian Chioreanu, and Claudius Peleskei. "Agile approach with Kanban in information security risk management." In 2016 IEEE International Conference on Automation, Quality and Testing, Robotics (AQTR). IEEE, 2016. http://dx.doi.org/10.1109/aqtr.2016.7501278.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Ji, Yi, Danyan Wen, Haiquan Wang, and Chunhe Xia. "A logic-based approach to network security risk assessment." In 2009 ISECS International Colloquium on Computing, Communication, Control, and Management (CCCM). IEEE, 2009. http://dx.doi.org/10.1109/cccm.2009.5267887.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Neill, Mike. "An Integrated Approach to Operational Risk Management – The Role of Process Safety Management." In SPE Health, Safety, Security, Environment, & Social Responsibility Conference - North America. Society of Petroleum Engineers, 2017. http://dx.doi.org/10.2118/184477-ms.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Jimenez, Hernando, Ian Stults, and Dimitri Mavris. "A Morphological Approach for Proactive Risk Management in Civil Aviation Security." In 47th AIAA Aerospace Sciences Meeting including The New Horizons Forum and Aerospace Exposition. American Institute of Aeronautics and Astronautics, 2009. http://dx.doi.org/10.2514/6.2009-1636.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Papadaki, Katerina, and Nineta Polemi. "Towards a Systematic Approach for Improving Information Security Risk Management Methods." In 2007 IEEE 18th International Symposium on Personal, Indoor and Mobile Radio Communications. IEEE, 2007. http://dx.doi.org/10.1109/pimrc.2007.4394150.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Papadaki, Ekaterini, Despina Polemi, and Dimitrios Kon/nos Damilos. "A Holistic, Collaborative, Knowledge-Sharing Approach for Information Security Risk Management." In 2008 The Third International Conference on Internet Monitoring and Protection. IEEE, 2008. http://dx.doi.org/10.1109/icimp.2008.19.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Ilvonen, Ilona, Jari Jussila, Hannu Karkkainen, and Tero Paivarinta. "Knowledge Security Risk Management in Contemporary Companies -- Toward a Proactive Approach." In 2015 48th Hawaii International Conference on System Sciences (HICSS). IEEE, 2015. http://dx.doi.org/10.1109/hicss.2015.472.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Security risk management approach"

1

Ek, David R. Risk Based Security Management at Research Reactors. Office of Scientific and Technical Information (OSTI), 2015. http://dx.doi.org/10.2172/1222990.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

ARMY SAFETY CENTER FORT RUCKER AL. Army Ground Risk Management Publication: Countermeasure, Vol 21, No 4, April 2000. Water Safety... A Risk Management Approach. Defense Technical Information Center, 2000. http://dx.doi.org/10.21236/ada376108.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Day, Clifford E. Risk Management Security: Improving the United States Air Force Protection Level Asset Security System. Defense Technical Information Center, 2001. http://dx.doi.org/10.21236/ada407686.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Awadalla, N. G. A risk management approach to nuclear waste inventory versus storage capacity. Office of Scientific and Technical Information (OSTI), 1996. http://dx.doi.org/10.2172/332194.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Morgeson, J. D., Jason A. Dechant, Yev Kirpichevsky, Yazmin Seda-Sanabria, and Enrique E. Matheu. A Consistent Approach for Security Risk Assessments of Dams and Related Critical Infrastructure. Defense Technical Information Center, 2014. http://dx.doi.org/10.21236/ada605156.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Forrest, Robert, Jason Christian Reinhardt, Timothy A. Wheeler, and Adam David Williams. A 3S Risk ?3SR? Assessment Approach for Nuclear Power: Safety Security and Safeguards. Office of Scientific and Technical Information (OSTI), 2017. http://dx.doi.org/10.2172/1408805.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

ARMY SAFETY CENTER FORT RUCKER AL. The Risk Management Approach: A Concept for Balancing Risks With Mission Needs. Defense Technical Information Center, 2000. http://dx.doi.org/10.21236/ada382959.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

ARMY SAFETY CENTER FORT RUCKER AL. The Risk Management Approach: A Concept for Balancing Risks With Mission Needs. Defense Technical Information Center, 1985. http://dx.doi.org/10.21236/ada383265.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

ARMY SAFETY CENTER FORT RUCKER AL. The Risk Management Approach: A Concept for Balancing Risks With Mission Needs. Defense Technical Information Center, 2000. http://dx.doi.org/10.21236/ada372996.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Collier, Zachary, Thomas Polmateer, and James Lambert. Risk Management Decision Making for Security and Trust in Hardware Supply Chains. Purdue University, 2021. http://dx.doi.org/10.5703/1288284317287.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!