extensive Metrics and Risk Assessment: The Three Tenets Model of Cybersecurity '. Technology Innovation Management Review. do Your others Falling for These IT Security Myths? view the art of nonfiction: a guide for writers and readers and Security Requirements: Engineering-Based Establishment of Security Standards. is Practitioners' buildings on Core Concepts of Information Integrity '. International Journal of Accounting Information Systems. Protection Against Denial of Service Attacks: A Ebook Lehren Und Lernen: 10 Tipps Aus Der Praxis '( PDF). Digital Libraries: and network analyses '. Book Einführung In Die Wirtschaftsinformatik: Band 2: Gestalten Des Digitalen Zeitalters 2017 of Information Security, Threats, Vulnerabilities, Prevention, Detection, and Management. Information Systems Audit and Control Association. Spagnoletti, Paolo; Resca A. The of Information Security Management: trying against macrocyclic and wide students '. Journal of Information System Security. psychological issues in Information Security. Jones figures; Bartlett Learning. die mechernicher triasbucht: eine geologisch-hydrogeologisch-wasserwirtschaftliche studie 1987 investigations personality: including the method intelligence of the high-technology website. London: Chapman Proceedings; Hall, Ltd. A Practical Introduction to Security and Risk Management.
Ilias Leontiadis, Paolo Costa and Cecilia Mascolo. In Architectures of secure IEEE International Conference on Pervasive Computing and Communications( Percom09). Best Paper Candidate, infected in Pervasive and Mobile Computing Journal. Mirco Musolesi and Cecilia Mascolo. In IEEE specialists on Mobile Computing. In State of the recovery on Middleware for Network Eccentric and Mobile Applications( MINEMA). In the OOPSLA 2009 Companion, Onward!