Building a comprehensive IT security program : practical guidelines and best practices /
This book explains the ongoing war between private business and cyber criminals, state-sponsored attackers, terrorists, and hacktivist groups. Further, it explores the risks posed by trusted employees that put critical information at risk through malice, negligence, or simply making a mistake. It cl...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | Wittkop, Jeremy (Autor) |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
[New York, New York] :
Apress,
[2016]
|
Temas: | |
Acceso en línea: | Texto completo (Requiere registro previo con correo institucional) |
Ejemplares similares
-
Using the IBM Security Framework and IBM Security Blueprint to realize business-driven security /
Publicado: (2013) -
IT security policy management usage patterns using IBM Tivoli Security Policy Manager /
Publicado: (2011) -
Compliance in der IT-Sicherheit : ISO 2700x-Standard und DSGVO /
por: Harich, Thomas W.
Publicado: (2018) -
Secure operations and protections /
Publicado: (2021) -
Defensive security handbook : best practices for securing infrastructure /
por: Brotherston, Lee, et al.
Publicado: (2017)