Security Planning An Applied Approach /
This book guides readers through building an IT security plan. Offering a template, it helps readers to prioritize risks, conform to regulation, plan their defense and secure proprietary/confidential information. The process is documented in the supplemental online security workbook. Security Planni...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | Lincke, Susan (Autor) |
Autor Corporativo: | SpringerLink (Online service) |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Cham :
Springer International Publishing : Imprint: Springer,
2015.
|
Edición: | 1st ed. 2015. |
Temas: | |
Acceso en línea: | Texto Completo |
Ejemplares similares
-
Advanced Information Systems Engineering Workshops CAiSE 2014 International Workshops, Thessaloniki, Greece, June 16-20, 2014, Proceedings /
Publicado: (2014) -
Advanced Information Systems Engineering Workshops CAiSE 2015 International Workshops, Stockholm, Sweden, June 8-9, 2015, Proceedings /
Publicado: (2015) -
Security, Privacy, and Trust in Modern Data Management
Publicado: (2007) -
Security for Web Services and Service-Oriented Architectures
por: Bertino, Elisa, et al.
Publicado: (2010) -
Computer Security -- ESORICS 2012 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012, Proceedings /
Publicado: (2012)