<p>This book presents a framework to model the main activities of information security management and governance. The same model can be used for any security sub-domain such as cybersecurity data protection access rights management business continuity etc.</p>
Piracy-free
Assured Quality
Secure Transactions
Delivery Options
Please enter pincode to check delivery time.
*COD & Shipping Charges may apply on certain items.