A Complete Guide to Planning and Implementation Create appropriate, security-focused business propositions that consi
Develop and implement an effective end-to-end security program Today's complex world of mobile platforms, cloud c
This book introduces novel research targeting technical aspects of protecting information security and establishing trus
The Growing Imperative Need for Effective Information Security Governance With monotonous regularity, headlines annou
Specifically oriented to the needs of information systems students, PRINCIPLES OF INFORMATION SECURITY, 5e delivers the
The angles of attack in today’s cyber security landscape evolve every moment. But even more ominous, there is no o