X
Search Filters
Format Format
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
acceptability (1) 1
agricultural engineering (1) 1
algae (1) 1
antibacterial activity (1) 1
bacteria (1) 1
balancing (1) 1
brachionus-plicatilis (1) 1
buying (1) 1
ceramic clay (1) 1
clay (1) 1
cod gadus-morhua (1) 1
computer crime (1) 1
computer science, information systems (1) 1
computer science, software engineering (1) 1
computer security (1) 1
crassostrea-gigas (1) 1
cyberattacks (1) 1
cybercrime (1) 1
cyberinsurance (1) 1
cybersecurity (1) 1
fish (1) 1
fisheries (1) 1
gadus morhua (1) 1
green water (1) 1
halibut hippoglossus-hippoglossus (1) 1
information security (1) 1
investments (1) 1
larvae (1) 1
marine larvae (1) 1
microalgae (1) 1
microbial control (1) 1
microorganisms (1) 1
pastes (1) 1
planktonic algae (1) 1
risk (1) 1
risk analysis (1) 1
risk management (1) 1
security (1) 1
skeletonema-costatum (1) 1
strategy (1) 1
tanks (1) 1
tetraselmis-suecica (1) 1
vibrio-anguillarum (1) 1
yolk-sac larvae (1) 1
more...
Language Language
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


IEEE Security & Privacy, ISSN 1540-7993, 11/2015, Volume 13, Issue 6, pp. 38 - 43
To achieve a proper balance between security investments and acceptable loss, businesses take a mixed approach to risk management. In addition to preventive... 
cybercrime | security | Investments | Information security | Risk management | cyberinsurance | Computer security | Computer crime | cybersecurity | cyberattacks | risk analysis | COMPUTER SCIENCE, SOFTWARE ENGINEERING | COMPUTER SCIENCE, INFORMATION SYSTEMS | Balancing | Buying | Risk | Strategy | Security | Acceptability
Journal Article
Aquacultural Engineering, ISSN 0144-8609, 07/2012, Volume 49, pp. 23 - 34
Journal Article
No results were found for your search.

Cannot display more than 1000 results, please narrow the terms of your search.