Udvidet returret til d. 31. januar 2025

Designing IT security in the enterprise

Bag om Designing IT security in the enterprise

The study of crime in general has long remained a poorly understood or rather poorly appreciated subject. Indeed, the fight against crime has too often been reduced to the creation of repressive laws and the development of technological or technical security tools. This book should be approached, not as a collection of magic recipes for computer security in the technical sense of the term, but rather as a tool to help understand the problem of computer security in companies. The book "Conceiving IT security in the enterprise" is composed of three main parts, subdivided into titles and subsections (1, 2, 3, etc.). It would be risky and even pretentious to give some advice or other purely technical indications in this book, since it is based on already established works and processes. It is primarily intended for people responsible at any level for the security of information systems within organizations. It is designed to be accessible to all categories of audiences, as security remains a matter of shared responsibility.

Vis mere
  • Sprog:
  • Engelsk
  • ISBN:
  • 9786205978504
  • Indbinding:
  • Paperback
  • Sideantal:
  • 108
  • Udgivet:
  • 12. maj 2023
  • Størrelse:
  • 150x7x220 mm.
  • Vægt:
  • 179 g.
  • BLACK WEEK
  Gratis fragt
Leveringstid: 2-3 uger
Forventet levering: 17. december 2024
Forlænget returret til d. 31. januar 2025

Beskrivelse af Designing IT security in the enterprise

The study of crime in general has long remained a poorly understood or rather poorly appreciated subject. Indeed, the fight against crime has too often been reduced to the creation of repressive laws and the development of technological or technical security tools. This book should be approached, not as a collection of magic recipes for computer security in the technical sense of the term, but rather as a tool to help understand the problem of computer security in companies. The book "Conceiving IT security in the enterprise" is composed of three main parts, subdivided into titles and subsections (1, 2, 3, etc.). It would be risky and even pretentious to give some advice or other purely technical indications in this book, since it is based on already established works and processes. It is primarily intended for people responsible at any level for the security of information systems within organizations. It is designed to be accessible to all categories of audiences, as security remains a matter of shared responsibility.

Brugerbedømmelser af Designing IT security in the enterprise



Gør som tusindvis af andre bogelskere

Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.