The Information Systems Security Officers Guide: Establishing and Managing an Information Protection Program
|
V
Valuing information, 168–174
Vision statements, 91–92, 105–106
Vulnerabilities, 48–49, 68, 69
|
|
Valuing information, 168–174
Vision statements, 91–92, 105–106
Vulnerabilities, 48–49, 68, 69
|