Information technology. Security techniques. Guidelines for the assessment of information security controls

2019 ◽  
Sign in / Sign up

Export Citation Format

Share Document