References

Breach, T.D. 2014. “A “Kill Chain” Analysis of the 2013 Target Data Breach.” www.commerce.senate.gov/public/_cache/files/24d3c229-4f2f-405d-b8db-a3a67f183883/23E30AA955B5C00FE57CFD709621592C.2014-0325-target-kill-chain-analysis.pdf

csrc.nist.gov. “NIST Special Publications (SP).” http://csrc.nist.gov/publications/PubsSPs.html

EMC. April 2014. “Executive Summary.” Published by IDC Analyze the Future. www.emc.com/leadership/digital-universe/2014iview/executive-summary.htm

Hibberd, B.J., and A. Evatt. January–February 2004. “Mapping Information Flows: A Practical Guide.” The Information Management Journal 38, no. 1, pp. 58–64.

International Telecommunication Union. June 2012. “Overview of the Internet of Things. Recommendation ITU-T Y.2060.” ...

Get Building Successful Information Systems now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.