Designing IT security in the enterprise

About The Book

The study of crime in general has long remained a poorly understood or rather poorly appreciated subject. Indeed the fight against crime has too often been reduced to the creation of repressive laws and the development of technological or technical security tools. This book should be approached not as a collection of magic recipes for computer security in the technical sense of the term but rather as a tool to help understand the problem of computer security in companies. The book Conceiving IT security in the enterprise is composed of three main parts subdivided into titles and subsections (1 2 3 etc.). It would be risky and even pretentious to give some advice or other purely technical indications in this book since it is based on already established works and processes. It is primarily intended for people responsible at any level for the security of information systems within organizations. It is designed to be accessible to all categories of audiences as security remains a matter of shared responsibility.
Piracy-free
Piracy-free
Assured Quality
Assured Quality
Secure Transactions
Secure Transactions
Delivery Options
Please enter pincode to check delivery time.
*COD & Shipping Charges may apply on certain items.
Review final details at checkout.
downArrow

Details


LOOKING TO PLACE A BULK ORDER?CLICK HERE