|
|
|
| | Managing Risk and Information Security: Protect to Enable
Newly promoted CISOs rapidly realize that the scope of the position they have taken on
is often beyond what they have been prepared for. The nature of securing an enterprise
is daunting and overwhelming. There are no simple checklists or roadmaps for success.
Many of the technical security skills a CISO has acquired during the early... | | Copy, Rip, Burn: The Politics of Copyleft and Open Source
From downloading music and movies to accessing free software, digital media is forcing us to rethink the very idea of intellectual property. While big companies complain about lost profits, the individual has never enjoyed such freedom and autonomy. Berry explores this debate in a concise way, offering an ideal introduction for anyone not versed... |
|
|
|
Result Page: 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 |