Linked e-resources
Details
Table of Contents
Computer use and data security policies and standards
Network/DMZ design
Defense in depth
Authentication and authorization
Security and the mobile employee
Business continuity planning
Hackers, snoops, and viruses
Personnel issues and hiring practices
Contractual considerations
Data privacy laws
Overseas outsourcing.
Network/DMZ design
Defense in depth
Authentication and authorization
Security and the mobile employee
Business continuity planning
Hackers, snoops, and viruses
Personnel issues and hiring practices
Contractual considerations
Data privacy laws
Overseas outsourcing.