@dblp

Practical Application of a Security Management Maturity Model for SMEs based on Predefined Schemas.

, , , and . SECRYPT, page 391-398. INSTICC Press, (2008)

Links and resources

Tags