Managing Information Security offers focused coverage of how to protect mission critical systems, and how to deploy security management systems, IT security, ID
With the growth in social networking and the potential for larger and larger breaches of sensitive data,it is vital for all enterprises to ensure that computer
Many techniques, algorithms, protocols and tools have been developed in the different aspects of cyber-security, namely, authentication, access control, availab
Historically, security managers have tended to be sourced from either the armed forces or law enforcement. But the increasing complexity of the organisations em
Managing Risk and Information Security: Protect to Enable, an ApressOpen title, describes the changing risk environment and why a fresh approach to information