Conflicts of Interest Conflicts of Interest

Conflicts of Interest

Description de l’éditeur

The inter-workings of computer security is often viewed as mysterious; however, nothing could be further from the truth.  Computer Security is Common Sense is a series of simple to follow books, each tackling a separate aspect of computer security.  Through use of analogies, these book help associate computer security practices with real life, everyday examples without sacrificing the accuracy of the technical details.  These books are perfect for non-technical managers, computer security novices, and systems administrators looking to broaden their knowledge.


Conflicts of Interest addresses the various roles that administrators and security personnel are placed in as well as how these roles may effect each other and the organization.  This book attempts to shed light on the complex nature of proper checks-and-balances, several considerations to account for, and the reason to employ them in the first place.

  • GENRE
    Informatique et Internet
    SORTIE
    2012
    5 novembre
    LANGUE
    EN
    Anglais
    LONGUEUR
    32
    Pages
    ÉDITIONS
    Michael Reeves
    TAILLE
    6,9
    Mo

    Plus de livres par Michael Reeves

    Security Vs. Convenience Security Vs. Convenience
    2012
    The Myth of the Secure OS The Myth of the Secure OS
    2012
    The Path of Least Resistance: Computer Security Is Common Sense The Path of Least Resistance: Computer Security Is Common Sense
    2012
    Evangelical Pharisees Evangelical Pharisees
    2023
    Gottesfurcht Gottesfurcht
    2022
    God Shines Forth God Shines Forth
    2022

    D’autres ont aussi acheté

    Implementing a Trusted Information Sharing Environment Implementing a Trusted Information Sharing Environment
    2012
    Anatomy of a Phish Anatomy of a Phish
    2014
    Administration: Configuration and Security Administration: Configuration and Security
    2013
    Information Security Management - ITP 370 Information Security Management - ITP 370
    2014
    The State of Risk-Based Security Management The State of Risk-Based Security Management
    2012
    Hacked?! Hacked?!
    2015