Building a Comprehensive IT Security Program Practical Guidelines and Best Practices /
This book explains the ongoing war between private business and cyber criminals, state-sponsored attackers, terrorists, and hacktivist groups. Further, it explores the risks posed by trusted employees that put critical information at risk through malice, negligence, or simply making a mistake. It cl...
Κύριος συγγραφέας: | Wittkop, Jeremy (Συγγραφέας) |
---|---|
Συγγραφή απο Οργανισμό/Αρχή: | SpringerLink (Online service) |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Berkeley, CA :
Apress : Imprint: Apress,
2016.
|
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Παρόμοια τεκμήρια
-
Smart Cards, Tokens, Security and Applications
Έκδοση: (2017) -
Compilation for Secure Multi-party Computation
ανά: Büscher, Niklas, κ.ά.
Έκδοση: (2017) -
Voice over IP Security A Comprehensive Survey of Vulnerabilities and Academic Research /
ανά: Keromytis, Angelos D.
Έκδοση: (2011) -
The Economics of Information Security and Privacy
Έκδοση: (2013) -
Bluetooth Security Attacks Comparative Analysis, Attacks, and Countermeasures /
ανά: Haataja, Keijo, κ.ά.
Έκδοση: (2013)