<p><h4>Develop and implement an effective end-to-end security program</h4><p>Today's complex world of mobile platforms, cloud computing, and ubiquitous data access puts new security demands on every IT professional. <i>Information Security: The Complete Reference, Second Edition</i> (previously titl
Information security: the complete reference
β Scribed by Mark Rhodes-Ousley
- Publisher
- McGraw-Hill Osborne Media
- Year
- 2013
- Tongue
- English
- Leaves
- 897
- Edition
- 2
- Category
- Library
No coin nor oath required. For personal study only.
π SIMILAR VOLUMES
Develop and implement an effective end-to-end security program Todayβs complex world of mobile platforms, cloud computing, and ubiquitous data access puts new security demands on every IT professional. <em>Information Security: The Complete Reference, Second Edition</em> (previously titled <em>Ne
<h4>Develop and implement an effective end-to-end security program</h4> <p>Todayβs complex world of mobile platforms, cloud computing, and ubiquitous data access puts new security demands on every IT professional. <i>Information Security: The Complete Reference, Second Edition</i> (previously titled