Sold Out
Book Categories |
Ch. 1 | Introduction and Overview | 1 |
Ch. 2 | A Growing Dependency | 13 |
Ch. 3 | The Disrupters Are Among Us | 33 |
Ch. 4 | Asleep at the Switch | 79 |
Ch. 5 | Protecting Your Information Assets | 107 |
Ch. 6 | Protection Posture Case Studies | 165 |
Ch. 7 | Summary and Conclusions | 197 |
App. A: Details of the NII | 199 | |
App. B: Case Studies | 207 | |
References | 269 | |
Glossary | 291 | |
Index | 295 |
Login|Complaints|Blog|Games|Digital Media|Souls|Obituary|Contact Us|FAQ
CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!! X
You must be logged in to add to WishlistX
This item is in your Wish ListX
This item is in your CollectionProtection and security on the information superhighway
X
This Item is in Your InventoryProtection and security on the information superhighway
X
You must be logged in to review the productsX
X
X
Add Protection and security on the information superhighway, Discusses the wide realm of issues facing the world's information security, focusing on the practical solutions to a variety of specific problems confronting small to large businesses, government, the military and individuals. Contains a wealth of example, Protection and security on the information superhighway to the inventory that you are selling on WonderClubX
X
Add Protection and security on the information superhighway, Discusses the wide realm of issues facing the world's information security, focusing on the practical solutions to a variety of specific problems confronting small to large businesses, government, the military and individuals. Contains a wealth of example, Protection and security on the information superhighway to your collection on WonderClub |