Search Results - hacker (computer security)

  • Showing 1 - 1 results of 1
Refine Results
  1. 1

    Information security a manager's guide to thwarting data thieves and hackers / by Alexander, Philip, 1963-

    Published 2008
    Table of Contents: “…Computer use and data security policies and standards -- Network/DMZ design -- Defense in depth -- Authentication and authorization -- Security and the mobile employee -- Business continuity planning -- Hackers, snoops, and viruses -- Personnel issues and hiring practices -- Contractual considerations -- Data privacy laws -- Overseas outsourcing.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook