The effective incident response team /
When an intruder, worm, virus, or automated attack succeeds in targeting a computer system, having specific controls and a response plan in place can greatly lessen losses. Accordingly, businesses are realizing that it is unwise to invest resources in preventing computer-related security incidents w...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | Lucas, Julie, 1964- |
Otros Autores: | Moeller, Brian |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Boston :
Addison-Wesley,
2004.
|
Temas: | |
Acceso en línea: | Texto completo (Requiere registro previo con correo institucional) |
Ejemplares similares
-
Software security : building security in /
por: McGraw, Gary, 1966-
Publicado: (2006) -
Security on IBM z/VSE /
Publicado: (2011) -
Honeypots : tracking hackers /
por: Spitzner, Lance
Publicado: (2003) -
Computer incident response and product security /
por: Rajnovic, Damir, 1965-
Publicado: (2011) -
Hack I.T. : security through penetration testing /
por: Klevinsky, T. J.
Publicado: (2002)