This book will allow to know the different theoretical references necessary to reach the design and construction of a cybersecurity framework through the use of free software and emerging technologies. How was the selection of the different antecedents obtained this was carried out through a search in different bibliographic sources in order to take up the most important and necessary to manage the different risks and threats that can be generated in any context.
Piracy-free
Assured Quality
Secure Transactions
Delivery Options
Please enter pincode to check delivery time.
*COD & Shipping Charges may apply on certain items.