Building a Comprehensive IT Security Program Practical Guidelines and Best Practices /
This book explains the ongoing war between private business and cyber criminals, state-sponsored attackers, terrorists, and hacktivist groups. Further, it explores the risks posed by trusted employees that put critical information at risk through malice, negligence, or simply making a mistake. It cl...
Main Author: | Wittkop, Jeremy. (Author, http://id.loc.gov/vocabulary/relators/aut) |
---|---|
Corporate Author: | SpringerLink (Online service) |
Language: | English |
Published: |
Berkeley, CA :
Apress : Imprint: Apress,
2016.
|
Edition: | 1st ed. 2016. |
Subjects: | |
Online Access: | https://doi.org/10.1007/978-1-4842-2053-5 |
Similar Items
-
Cyber-Physical Systems Security edited by Çetin Kaya Koç.
Published: (2018) -
Introduction to Security Reduction by Fuchun Guo, Willy Susilo, Yi Mu.
by: Guo, Fuchun., et al.
Published: (2018) -
Certified Ethical Hacker (CEH) Foundation Guide by Sagar Ajay Rahalkar.
by: Rahalkar, Sagar Ajay., et al.
Published: (2016) -
Bluetooth Security Attacks Comparative Analysis, Attacks, and Countermeasures / by Keijo Haataja, Konstantin Hyppönen, Sanna Pasanen, Pekka Toivanen.
by: Haataja, Keijo., et al.
Published: (2013) -
Introduction to Public Key Infrastructures by Johannes A. Buchmann, Evangelos Karatsiolis, Alexander Wiesmaier.
by: Buchmann, Johannes A., et al.
Published: (2013)