This book presents a framework to model the main activities of information security management and governance. The same model can be used for any security sub-domain such as cybersecurity, data protection, access rights management, business continuity, etc.
Read More
Specifications
Imprint
Routledge Cavendish
Manufacturing, Packaging and Import Info
Have doubts regarding this product?
Safe and Secure Payments.Easy returns.100% Authentic products.