O'Reilly logo

Managing Risk and Information Security: Protect to Enable, Second Edition by Malcolm W. Harkins

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

References

Accenture. 2012. Accenture Technology Vision 2012 . http://www.accenture.com/us-en/technology/technology-labs/Pages/insight-accenture-technology-vision-2012.aspx .

Ahamad, Mustaque. 2011. Georgia Tech Releases Cyber Threats Forecast for 2012 . Comment in Georgia Tech press release. http://www.scs.gatech.edu/content/georgia-tech-releases-cyber-threats-forecast-2012 .

Alexander, Aileen and Jamey Cummings. 2016. “The Rise of the Chief Information Security Officer.” People + Strategy 39:1.

Alperovitch, Dmitri. 2012. Comment in Georgia Tech Emerging Cyber Threats Report 2012. http://www.gtisc.gatech.edu/doc/emerging_cyber_threats_report2012.pdf .

Amabile, Teresa M., and Steven J. Kramer. 2011. “The Power of Small Wins.” Harvard ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required