Outsourcing information security
Saved in:
| Main Author: | |
|---|---|
| Corporate Author: | |
| Format: | Electronic eBook |
| Language: | English |
| Published: |
Boston :
Artech House,
c2004.
|
| Series: | Artech House computer security series.
|
| Subjects: | |
| Online Access: | An electronic book accessible through the World Wide Web; click to view |
| Tags: |
No Tags, Be the first to tag this record!
|
Similar Items: Outsourcing information security
- Relation based access control /
- Building the Infrastructure for Cloud Security A Solutions view /
- Intrusion prevention and active response deploying network and host IPS /
- Mastering metasploit : write and implement sophisticated attack vectors in Metasploit using a completely hands-on approach /
- Kali Linux CTF Blueprints : build, test, and customize your own Capture the Flag challenges across multiple platforms designed to be attacked with Kali Linux /
- Security intelligence : a practitioner's guide to solving enterprise security challenges /