Security Planning An Applied Approach /
This book guides readers through building an IT security plan. Offering a template, it helps readers to prioritize risks, conform to regulation, plan their defense and secure proprietary/confidential information. The process is documented in the supplemental online security workbook. Security Planni...
Main Author: | Lincke, Susan (Author) |
---|---|
Corporate Author: | SpringerLink (Online service) |
Format: | Electronic eBook |
Language: | English |
Published: |
Cham :
Springer International Publishing : Imprint: Springer,
2015.
|
Subjects: | |
Online Access: | Full Text via HEAL-Link |
Similar Items
-
Computer Security – ESORICS 2012 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings /
Published: (2012) -
Information Systems Security and Privacy Second International Conference, ICISSP 2016, Rome, Italy, February 19-21, 2016, Revised Selected Papers /
Published: (2017) -
Security for Web Services and Service-Oriented Architectures
by: Bertino, Elisa, et al.
Published: (2010) -
Building an Effective IoT Ecosystem for Your Business
by: Sinha, Sudhi R., et al.
Published: (2017) -
Applied Information Security A Hands-on Approach /
by: Basin, David, et al.
Published: (2011)