Building a Comprehensive IT Security Program Practical Guidelines and Best Practices /

This book explains the ongoing war between private business and cyber criminals, state-sponsored attackers, terrorists, and hacktivist groups. Further, it explores the risks posed by trusted employees that put critical information at risk through malice, negligence, or simply making a mistake. It cl...

Full description

Bibliographic Details
Main Author: Wittkop, Jeremy (Author)
Corporate Author: SpringerLink (Online service)
Format: Electronic eBook
Language:English
Published: Berkeley, CA : Apress : Imprint: Apress, 2016.
Subjects:
Online Access:Full Text via HEAL-Link

Similar Items