Security Vs. Convenience Security Vs. Convenience

Security Vs. Convenience

Beschreibung des Verlags

The inter workings of computer security is often viewed as mysterious; however, nothing could be further from the truth.  Computer Security is Common Sense is a series of simple to follow books, each tackling a separate aspect of computer security.  Through use of analogies, these book help associate computer security practices with real life, everyday examples without sacrificing the accuracy of the technical details.  These books are perfect for non-technical manager, computer security novices, and systems administrators looking to broaden their knowledge.


Security vs. Convenience tackles the ever prominent balance between securing a network and its information and the business needs for which the network exists.

  • GENRE
    Computer und Internet
    ERSCHIENEN
    2012
    1. November
    SPRACHE
    EN
    Englisch
    UMFANG
    50
    Seiten
    VERLAG
    Michael Reeves
    ANBIETERINFO
    Michael Reeves
    GRÖSSE
    12,4
     MB
    Cybersecurity Essentials Cybersecurity Essentials
    2018
    ISC2 CISSP Certified Information Systems Security Professional Official Study Guide ISC2 CISSP Certified Information Systems Security Professional Official Study Guide
    2024
    The InfoSec Handbook The InfoSec Handbook
    2014
    CompTIA Security+: SY0-601 Certification Guide CompTIA Security+: SY0-601 Certification Guide
    2020
    How Cybersecurity Really Works How Cybersecurity Really Works
    2021
    The Official (ISC)2 CISSP CBK Reference The Official (ISC)2 CISSP CBK Reference
    2021
    The Myth of the Secure OS The Myth of the Secure OS
    2012
    The Path of Least Resistance: Computer Security Is Common Sense The Path of Least Resistance: Computer Security Is Common Sense
    2012
    Conflicts of Interest Conflicts of Interest
    2012
    Freude am Beten Freude am Beten
    2024
    Gottesfurcht Gottesfurcht
    2022
    The Good God The Good God
    2012
    Creating a Trusted Network for Homeland Security: Second Report of the Markle Foundation Task Force Creating a Trusted Network for Homeland Security: Second Report of the Markle Foundation Task Force
    2012
    Protecting America's Freedom in the Information Age: A Report of the Markle Foundation Task Force Protecting America's Freedom in the Information Age: A Report of the Markle Foundation Task Force
    2012
    Implementing a Trusted Information Sharing Environment: Using Immutable Audit Logs to Increase Security, Trust, and Accountability Implementing a Trusted Information Sharing Environment: Using Immutable Audit Logs to Increase Security, Trust, and Accountability
    2012
    The InfoSec Handbook The InfoSec Handbook
    2014
    Rethinking the Internet of Things Rethinking the Internet of Things
    2014
    Software Security For You Software Security For You
    2015