| PDF - Angenommene Version (267kB) | |
| PDF (1MB) |
- URN zum Zitieren dieses Dokuments:
- urn:nbn:de:bvb:355-epub-366957
- DOI zum Zitieren dieses Dokuments:
- 10.5283/epub.36695
Zusammenfassung
The need to protect resources against attackers is reflected by huge information security investments of firms worldwide. In the presence of budget constraints and a diverse set of assets to protect, organizations have to decide in which IT security measures to invest, how to evaluate those investment decisions, and how to learn from past decisions to optimize future security investment actions. ...
Nur für Besitzer und Autoren: Kontrollseite des Eintrags