Building a Comprehensive IT Security Program Practical Guidelines and Best Practices /
This book explains the ongoing war between private business and cyber criminals, state-sponsored attackers, terrorists, and hacktivist groups. Further, it explores the risks posed by trusted employees that put critical information at risk through malice, negligence, or simply making a mistake. It cl...
Main Author: | |
---|---|
Corporate Author: | |
Language: | English |
Published: |
Berkeley, CA :
Apress : Imprint: Apress,
2016.
|
Edition: | 1st ed. 2016. |
Subjects: | |
Online Access: | https://doi.org/10.1007/978-1-4842-2053-5 |