Total Length: 1468 words ( 5 double-spaced pages)
Total Sources: 5
Page 1 of 5
Stuck Writing Your "Systems Development Process" Essay?
Brey, P. (2007). Ethical aspects of information security and privacy. In Security, privacy, and trust in modern data management (pp. 21-36). Springer Berlin Heidelberg.
ConnectUS. (2016).7 Main Advantages and Disadvantages of Open Source Software. Retrieved from: http://connectusfund.org/7-main-advantages-and-disadvantages-of-open-source-software
ePanorama. (2011). SCADA systems security issues. Retrieved from: http://www.epanorama.net/newepa/2011/12/14/scada-systems-security-issues/
Infosec Institute. (2016). SCADA & Security of Critical Infrastructures. Retrieved from: http://resources.infosecinstitute.com/scada-security-of-critical-infrastructures/#gref
Rainer, R. K., Cegielski, C. G., Splettstoesser-Hogeterp, I., & Sanchez-Rodriguez, C. (2013). Introduction to information systems: Supporting and transforming business. Hoboken: John Wiley & Sons.
Whitman, M. E., & Mattord, H. J. (2010). Readings & Cases in Information Security: Law & Ethics. Nelson Education.