This paper discusses a methodology to apply 6-Sigma techniques as part of a security audit of a complete system for the purpose of threat assessment.

File Reference
6SIGMA
Publish Date
Resource Category
DigitalSubs
Resource Type
13
Resource Type Name
White Papers/Case Studies
Resource Passport Required
On