Building a Comprehensive IT Security Program Practical Guidelines and Best Practices /

This book explains the ongoing war between private business and cyber criminals, state-sponsored attackers, terrorists, and hacktivist groups. Further, it explores the risks posed by trusted employees that put critical information at risk through malice, negligence, or simply making a mistake. It cl...

Full description

Main Author: Wittkop, Jeremy. (Author, http://id.loc.gov/vocabulary/relators/aut)
Corporate Author: SpringerLink (Online service)
Language:English
Published: Berkeley, CA : Apress : Imprint: Apress, 2016.
Edition:1st ed. 2016.
Subjects:
Online Access:https://doi.org/10.1007/978-1-4842-2053-5

Similar Items