Managing Information Security Risks: The OCTAVE (SM) Approach

Christopher Alberts

Audrey Dorofee

©2003 |Addison-Wesley Professional | Available

Look Inside

Sample chapter is available for download in PDF format.

This material is protected under all copyright laws, as they currently exist. No portion of this material may be reproduced, in any form or by any means, without permission in writing from the publisher.