Vi bøger
Levering: 1 - 2 hverdage

Design of IT security policies - Juan Diego Muñoz - Bog

Bag om Design of IT security policies

Computer systems, computer equipment, information generated by organisations, companies, educational establishments, etc., are of great importance and must be properly controlled and protected. An alternative is the implementation of computer security policies to guarantee business continuity. With the increase of the technological infrastructure of the University of Cuenca, the number of users, departmental divisions and communication equipment is increasing, which generates the need to implement new security mechanisms to maintain the integrity, availability and confidentiality of the information. The proper functioning of computer equipment, computer systems and communication equipment must be linked to a correct selection of controls that allow the institutional interests to be achieved.

Vis mere
  • Sprog:
  • Engelsk
  • ISBN:
  • 9786207132690
  • Indbinding:
  • Paperback
  • Sideantal:
  • 96
  • Udgivet:
  • 4. februar 2024
  • Størrelse:
  • 150x7x220 mm.
  • Vægt:
  • 161 g.
  • 2-3 uger.
  • 21. december 2024
På lager
Forlænget returret til d. 31. januar 2025

Normalpris

Medlemspris

Prøv i 30 dage for 45 kr.
Herefter fra 79 kr./md. Ingen binding.

Beskrivelse af Design of IT security policies

Computer systems, computer equipment, information generated by organisations, companies, educational establishments, etc., are of great importance and must be properly controlled and protected. An alternative is the implementation of computer security policies to guarantee business continuity. With the increase of the technological infrastructure of the University of Cuenca, the number of users, departmental divisions and communication equipment is increasing, which generates the need to implement new security mechanisms to maintain the integrity, availability and confidentiality of the information. The proper functioning of computer equipment, computer systems and communication equipment must be linked to a correct selection of controls that allow the institutional interests to be achieved.

Brugerbedømmelser af Design of IT security policies



Gør som tusindvis af andre bogelskere

Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.