Information Security Architecture Exploring the evolution of IS, this book incorporates the knowledge that has pushed the information security life cycle from infancy to a more mature, understandable, and manageable state. It discusses three additional components: monitoring and detection; computer incident/emergency response; and, disaster recovery/business continuity planning. Full description
"synopsis" may belong to another edition of this title.
(No Available Copies)
Search Books: Create a WantCan't find the book you're looking for? We'll keep searching for you. If one of our booksellers adds it to AbeBooks, we'll let you know!
Create a Want