Sold Out
Book Categories |
1 | The information security challenge | 1 |
2 | Information security overview | 25 |
3 | Developing your information security program | 45 |
4 | People | 65 |
5 | Process | 97 |
6 | Technology | 129 |
7 | Information security roadmap | 175 |
8 | View into the future | 193 |
9 | Summary | 217 |
App. A | Security evaluation framework | 225 |
App. B | Information security Web sites | 243 |
App. C | Operational security standards | 245 |
App. D | Sample security job descriptions | 247 |
Login|Complaints|Blog|Games|Digital Media|Souls|Obituary|Contact Us|FAQ
CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!! X
You must be logged in to add to WishlistX
This item is in your Wish ListX
This item is in your CollectionThe executive guide to information security
X
This Item is in Your InventoryThe executive guide to information security
X
You must be logged in to review the productsX
X
X
Add The executive guide to information security, Praise for The Executive Guide to Information Security In today's world, no business can operate without securing its computers. This book conveys that message in clear, concise terms and acts as a tremendous primer to CEOs. –from the Foreword by , The executive guide to information security to the inventory that you are selling on WonderClubX
X
Add The executive guide to information security, Praise for The Executive Guide to Information Security In today's world, no business can operate without securing its computers. This book conveys that message in clear, concise terms and acts as a tremendous primer to CEOs. –from the Foreword by , The executive guide to information security to your collection on WonderClub |