Data network design
Risk Management Processes for Software Engineering Models
Risk Management Processes for Software Engineering Models
Establishing the business value of network security using analytical hierarchy process
Creating business value with information technology
Hi-index | 0.00 |
In the first article in the series on risk management we briefly discuss frame relay network versus leased lines, network management life cycle and a risk management program. We show how coordinated denial‐of‐service, a new type of threat, can attack a network. Copyright © 2000 John Wiley & Sons, Ltd.