Skip to main content
Chapter
Licensed
Unlicensed Requires Authentication

8 Risk-based security engineering

Become an author with De Gruyter Brill
Volume II Project Risk Management
This chapter is in the book Volume II Project Risk Management
© 2021 Walter de Gruyter GmbH, Berlin/Munich/Boston
Downloaded on 11.5.2026 from https://www.degruyterbrill.com/document/doi/10.1515/9783110652321-009/html?lang=en
Scroll to top button