𝔖 Bobbio Scriptorium
✦   LIBER   ✦

Network externalities, layered protection and IT security risk management

✍ Scribed by Wei T. Yue; Metin Çakanyıldırım; Young U. Ryu; Dengpan Liu


Book ID
113570549
Publisher
Elsevier Science
Year
2007
Tongue
English
Weight
792 KB
Volume
44
Category
Article
ISSN
0167-9236

No coin nor oath required. For personal study only.


📜 SIMILAR VOLUMES


[Lecture Notes in Computer Science] Inte
✍ Kantor, Paul; Muresan, Gheorghe; Roberts, Fred; Zeng, Daniel D.; Wang, Fei-Yue; 📂 Article 📅 2005 🏛 Springer Berlin Heidelberg 🌐 German ⚖ 246 KB

Intelligence And Security Informatics (isi) Can Be Broadly Defined As The Study Of The Development And Use Of Advanced Information Technologies And Systems For National And International Security-related Applications, Through An Integrated Technological, Organizational, And Policy-based Approach. In

[Springer Optimization and Its Applicati
✍ Gülpınar, Nalân; Harrison, Peter; Rüstem, Berç 📂 Article 📅 2010 🏛 Springer New York 🌐 English ⚖ 334 KB

This volume covers recent developments in the design, operation, and management of mobile telecommunication and computer systems. Uncertainty regarding loading and system parameters leads to challenging optimization and robustness issues. Stochastic modeling combined with optimization theory ensures