Published 2008
Table of Contents:
“…
Computer use and data
security policies and standards -- Network/DMZ design -- Defense in depth -- Authentication and authorization --
Security and the mobile employee -- Business continuity planning --
Hackers, snoops, and viruses -- Personnel issues and hiring practices -- Contractual considerations -- Data privacy laws -- Overseas outsourcing.…”
Call Number:
Loading…
Located:
Loading…
An electronic book accessible through the World Wide Web; click to view
Electronic
eBook