Information security management principles
I tiakina i:
| Kaituhi matua: | |
|---|---|
| Kaituhi rangatōpū: | |
| Ētahi atu kaituhi: | , , |
| Hōputu: | Tāhiko īPukapuka |
| Reo: | Ingarihi |
| I whakaputaina: |
Swindon, U.K. :
BCS Learning & Development Ltd.,
2013.
|
| Putanga: | 2nd ed. |
| Ngā marau: | |
| Urunga tuihono: | An electronic book accessible through the World Wide Web; click to view |
| Ngā Tūtohu: |
Kāore He Tūtohu, Me noho koe te mea tuatahi ki te tūtohu i tēnei pūkete!
|
Ngā tūemi rite: Information security management principles
- At the nexus of cybersecurity and public policy : some basic concepts and issues /
- Information assurance and computer security
- Cyberwar, cyberterror, cybercrime a guide to the role of standards in an environment of change and danger /
- Penetration testing with the Bash shell : make the most of the Bash shell and Kali Linux's command-line-based security assessment tools /
- Data privacy in the information age
- Implementing database security and auditing