Incident response /
Seventy percent of businesses reported security breaches in 2000, and the rate is on the rise. Is your organization ready to respond to such an incident head-on? Will you be able to tell whether an incident is an attack or a glitch in the system? Do you know how to assess the possible damage from an...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | Van Wyk, Kenneth R. |
Otros Autores: | Forno, Richard |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Sebastopol, CA :
O'Reilly,
©2001.
|
Edición: | 1st ed. |
Temas: | |
Acceso en línea: | Texto completo (Requiere registro previo con correo institucional) |
Ejemplares similares
-
Building a comprehensive IT security program : practical guidelines and best practices /
por: Wittkop, Jeremy
Publicado: (2016) -
Technische IT-Security für IT Security Manager : Von Cloud Computing über WLAN bis zu Penetrationstests /
por: Harich, Thomas W.
Publicado: (2018) -
Trusted computing : principles and applications /
por: Feng, Dengguo, et al.
Publicado: (2018) -
Using the IBM Security Framework and IBM Security Blueprint to realize business-driven security /
Publicado: (2013) -
Compliance in der IT-Sicherheit : ISO 2700x-Standard und DSGVO /
por: Harich, Thomas W.
Publicado: (2018)