Critical infrastructure cyber-security risk management
Part of book or chapter of book
Traditional IT cyber-security risk management methods are based on the evaluation of risks calculated as the likelihood of cyber-security incidents occurring. However, these probabilities are usually estimations or guesses based on past experience and incomplete data. I...
views in local repository
downloads in local repository
The information is available from the following content providers: