Designing Information Systems Security

Designing Information Systems Security

4.11 - 1251 ratings - Source

should be thought of as a aquot;pipelineaquot; through which a single type of composite data may flow. ... Level 0 represents the partitioning of the context diagram into the major processes and dataflows of the system. The top data flow diagram in figure B.2 is an example. ... partitioning may still be necessary, e.g., Process 2.3 on the Level 1 data flow diagram might be partitioned on a Level 2 data flow diagram.

Title:Designing Information Systems Security
Author:Richard Baskerville
Publisher: - 1988


You Must CONTINUE and create a free account to access unlimited downloads & streaming