Implementing email security and tokens current standards, tools, and practices /
Saved in:
| Main Author: | |
|---|---|
| Corporate Author: | |
| Other Authors: | |
| Format: | Electronic eBook |
| Language: | English |
| Published: |
Indianapolis, IN :
Wiley,
c2008.
|
| Subjects: | |
| Online Access: | An electronic book accessible through the World Wide Web; click to view |
| Tags: |
No Tags, Be the first to tag this record!
|
Similar Items: Implementing email security and tokens
- Essential computer security everyone's guide to e-mail, internet, and wireless security /
- Enterprise security a data-centric approach to securing the enterprise : a guide to applying data-centric security concepts for securing enterprise data to enable an agile enterprise /
- The secure online business handbook a practical guide to risk management and business continuity /
- Security architect : careers in information security /
- Security in distributed and networking systems
- Safeguarding critical e-documents implementing a program for securing confidential information assets /