Building a Comprehensive IT Security Program Practical Guidelines and Best Practices /
This book explains the ongoing war between private business and cyber criminals, state-sponsored attackers, terrorists, and hacktivist groups. Further, it explores the risks posed by trusted employees that put critical information at risk through malice, negligence, or simply making a mistake. It cl...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | Wittkop, Jeremy (Autor) |
Autor Corporativo: | SpringerLink (Online service) |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Berkeley, CA :
Apress : Imprint: Apress,
2016.
|
Edición: | 1st ed. 2016. |
Temas: | |
Acceso en línea: | Texto Completo |
Ejemplares similares
-
The Economics of Information Security and Privacy
Publicado: (2013) -
Voice over IP Security A Comprehensive Survey of Vulnerabilities and Academic Research /
por: Keromytis, Angelos D.
Publicado: (2011) -
Bluetooth Security Attacks Comparative Analysis, Attacks, and Countermeasures /
por: Haataja, Keijo, et al.
Publicado: (2013) -
Secure Data Deletion
por: Reardon, Joel
Publicado: (2016) -
Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems
Publicado: (2005)