[1]
2005. A methodology to implement an information security management system . Journal of Information Systems and Technology Management. 2, 2 (Jan. 2005), 121–136. DOI:https://doi.org/10.4301/S1807-17752005000200002.