- Full text PDF available (1)
Journals and Conferences
Information technology is widely used in processes vital to enterprises. Therefore, IT systems must meet at least the same level of security as required from the business processes supported by these systems. In this paper, we present a view on cybersecurity management as an enterprise-centered process, and we advocate the use of enterprise architecture in… (More)
The following books are reviewed: Tactical Wireless Communications and Networks: Design Concepts and Challenges (Elmasry, G.F) and FISMA and the Risk Management Framework: The new Practice of Federal Cyber Security (Gantz, S.D. and Philpott, D.R.).