Sökt på: Sökresultat
totalt 7 träffar
Adaptive Security Management Architecture
This volume enables security professionals to structure the best security program designed to meet the complex needs of an entire organization, taking into account the …
Information Security Management Handbook, Volume 7
Updated annually, the Information Security Management Handbook, Sixth Edition, Volume 7 is the most comprehensive and up-to-date reference available on information security and …
Ethical Hack
This book explains the methodologies, framework, and "e;unwritten conventions"e; that ethical hacks should employ to provide the maximum value to organizations that want to …
Fatal News
What was "e;information"e; in the early eighteenth century, and what influence did the emergence of information, as potential physical and psychological threat, have on …
Ethical Hack
This book explains the methodologies, framework, and "e;unwritten conventions"e; that ethical hacks should employ to provide the maximum value to organizations that want to …
Technical Guide to IPSec Virtual Private Networks
What is IPSec? What's a VPN? Why do the need each other? Virtual Private Network (VPN) has become one of the most recognized terms in our industry, yet there continuously seems to …
CISO's Guide to Penetration Testing
CISO's Guide to Penetration Testing: A Framework to Plan, Manage, and Maximize Benefits details the methodologies, framework, and unwritten conventions penetration tests should …