Guides for Managers and Policymakers

Allen, Julia et al. Security for Information Technology Service Contracts (CMU/SEI-SIM-003, ADA 336329). Pittsburgh, PA: Software Engineering Institute, Carnegie Mellon University, 1998. Available online: <http://www.cert.org/security-improvement/modules/m03.html>.

Best, Reba A. and Piquet, D. Cheryl . Computer Law and Software Protection: A Bibliography of Crime, Liability, Abuse, and Security. Jefferson, NC: McFarland, 1993.

Cappel, James J. ; Vanecek, Michael T. ; and Vedder, Richard G. “CEO and CIO Perspectives on Competitive Intelligence.” Communications of the ACM (August 1999).

Dijker, Barbara L., ed. Short Topics in System Administration. Vol. 2, A Guide to Developing Computing Policy Documents. Berkeley, ...

Get Managing Information Security Risks: The OCTAVESM Approach now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.