Virtualization: What are the security risks?Published in:Journal of Corporate Accounting & Finance (Wiley), 2011, v. 22, n. 5, p. 41, doi. 10.1002/jcaf.20704By:Fanning, Kurt;Cannon, David M.Publication type:Article
Risk-based Valuation of Investments in Information Security - A Combination Approach.Published in:Journal of Information System Security, 2012, v. 8, n. 1, p. 43By:Prakash, PuneetPublication type:Article
Editorial.Published in:Journal of Information System Security, 2012, v. 8, n. 1, p. 1By:Dhillon, GurpreetPublication type:Article