Corro'll (Kuh'rel) Driskell

52%
Flag icon
We use a product life cycle analogy to track threats as they mature from theoretical risks into full-blown exploits.
Managing Risk and Information Security: Protect to Enable
Rate this book
Clear rating