Archive > Volume 19 Issue 4 > 1996,19(4):37-43 CSTR:[cstr] Prev Next

The Security Strategy and Security Controls and Techniques for the Enterprise Management Information System