Gør som tusindvis af andre bogelskere
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.Du kan altid afmelde dig igen.
Offers a formal framework for finding and eliminating network security threats. This title focuses on the steps necessary to manage an assessment, including the development of a scope statement, the understanding and use of assessment methodology, the creation of an assessment team, and the production of a response report.
Shows how information security must be integrated into various aspects of the business process. This book examines Tier 1, Tier 2, and Tier 3 policies.
An effective information security program preserves your information assets and helps you meet business objectives. This book provides the tools you need to select, develop, and apply a security program that can be seen not as a nuisance but as a means to meeting your organization's goals.
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.