Readings and Cases in the Management of Information Security

Readings and Cases in the Management of Information Security
Author :
Publisher : Cengage Learning
Total Pages : 0
Release :
ISBN-10 : 0619216271
ISBN-13 : 9780619216276
Rating : 4/5 (276 Downloads)

Book Synopsis Readings and Cases in the Management of Information Security by : Michael E. Whitman

Download or read book Readings and Cases in the Management of Information Security written by Michael E. Whitman and published by Cengage Learning. This book was released on 2006 with total page 0 pages. Available in PDF, EPUB and Kindle. Book excerpt: This text provides students with a set of industry focused readings and cases illustrating real-world issues in information security.


Readings and Cases in the Management of Information Security Related Books

Readings and Cases in the Management of Information Security
Language: en
Pages: 0
Authors: Michael E. Whitman
Categories: Computer networks
Type: BOOK - Published: 2006 - Publisher: Cengage Learning

DOWNLOAD EBOOK

This text provides students with a set of industry focused readings and cases illustrating real-world issues in information security.
Readings and Cases in Information Security
Language: en
Pages:
Authors: Michael E. Whitman
Categories:
Type: BOOK - Published: 2011 - Publisher:

DOWNLOAD EBOOK

Readings and Cases in the Management of Information Security + Management of Information Security
Language: en
Pages:
Authors: Michael Whitman
Categories:
Type: BOOK - Published: 2007-04-01 - Publisher:

DOWNLOAD EBOOK

Readings & Cases in Information Security: Law & Ethics
Language: en
Pages: 352
Authors: Michael E. Whitman
Categories: Computers
Type: BOOK - Published: 2010-06-23 - Publisher: Cengage Learning

DOWNLOAD EBOOK

Readings and Cases in Information Security: Law and Ethics provides a depth of content and analytical viewpoint not found in many other books. Designed for use
Managing the Human Factor in Information Security
Language: en
Pages: 398
Authors: David Lacey
Categories: Computers
Type: BOOK - Published: 2011-04-06 - Publisher: John Wiley & Sons

DOWNLOAD EBOOK

With the growth in social networking and the potential for larger and larger breaches of sensitive data,it is vital for all enterprises to ensure that computer