Defend I.T security by example

"Ajay and Scott take an interesting approach in filling Defend I.T. with case studies and using them to demonstrate important security principles. This approach works well and is particularly valuable in the security space, where companies and consultants are often hesitant to discuss true secu...

Descripción completa

Detalles Bibliográficos
Autor principal: Gupta, Ajay (-)
Otros Autores: Laliberte, Scott
Formato: Libro electrónico
Idioma:Inglés
Publicado: Boston : Addison-Wesley c2004.
Edición:1st edition
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009627205106719

Ejemplares similares