|
|
|
|
|
|
|
| | Network Security: Private Communication in a Public World (2nd Edition)
Authors with credentials from some of the top software and hardware companies explain the latest advances in computer network security protocol. For security managers, programmers, and graduate or advanced undergraduate students.
It was a dark and stormy night. Somewhere in the distance a dog howled. A shiny object... | | IT Security Risk Control Management: An Audit Preparation Plan
Follow step-by-step guidance to craft a successful security program. You will identify with the paradoxes of information security and discover handy tools that hook security controls into business processes.
Information security is more than configuring firewalls, removing viruses, hacking machines, or setting passwords. Creating... |
|
|
Result Page: 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 |