Information security a manager's guide to thwarting data thieves and hackers /
Furkejuvvon:
| Váldodahkki: | |
|---|---|
| Searvvušdahkki: | |
| Materiálatiipa: | Elektrovnnalaš E-girji |
| Giella: | eaŋgalasgiella |
| Almmustuhtton: |
Westport, Conn. :
Praeger Security International,
2008.
|
| Ráidu: | PSI business security.
|
| Fáttát: | |
| Liŋkkat: | An electronic book accessible through the World Wide Web; click to view |
| Fáddágilkorat: |
Eai fáddágilkorat, Lasit vuosttaš fáddágilkora!
|
Sisdoallologahallan:
- Computer use and data security policies and standards
- Network/DMZ design
- Defense in depth
- Authentication and authorization
- Security and the mobile employee
- Business continuity planning
- Hackers, snoops, and viruses
- Personnel issues and hiring practices
- Contractual considerations
- Data privacy laws
- Overseas outsourcing.