Information security a manager's guide to thwarting data thieves and hackers /
I tiakina i:
| Kaituhi matua: | |
|---|---|
| Kaituhi rangatōpū: | |
| Hōputu: | Tāhiko īPukapuka |
| Reo: | Ingarihi |
| I whakaputaina: |
Westport, Conn. :
Praeger Security International,
2008.
|
| Rangatū: | PSI business security.
|
| Ngā marau: | |
| Urunga tuihono: | An electronic book accessible through the World Wide Web; click to view |
| Ngā Tūtohu: |
Kāore He Tūtohu, Me noho koe te mea tuatahi ki te tūtohu i tēnei pūkete!
|
Rārangi ihirangi:
- Computer use and data security policies and standards
- Network/DMZ design
- Defense in depth
- Authentication and authorization
- Security and the mobile employee
- Business continuity planning
- Hackers, snoops, and viruses
- Personnel issues and hiring practices
- Contractual considerations
- Data privacy laws
- Overseas outsourcing.