Security Vs. Convenience Security Vs. Convenience

Security Vs. Convenience

発行者による作品情報

The inter workings of computer security is often viewed as mysterious; however, nothing could be further from the truth.  Computer Security is Common Sense is a series of simple to follow books, each tackling a separate aspect of computer security.  Through use of analogies, these book help associate computer security practices with real life, everyday examples without sacrificing the accuracy of the technical details.  These books are perfect for non-technical manager, computer security novices, and systems administrators looking to broaden their knowledge.


Security vs. Convenience tackles the ever prominent balance between securing a network and its information and the business needs for which the network exists.

  • ジャンル
    コンピュータ/インターネット
    発売日
    2012年
    11月1日
    言語
    EN
    英語
    ページ数
    50
    ページ
    発行者
    Michael Reeves
    販売元
    Michael Reeves
    サイズ
    12.4
    MB
    Cybersecurity Essentials Cybersecurity Essentials
    2018年
    ISC2 CISSP Certified Information Systems Security Professional Official Study Guide ISC2 CISSP Certified Information Systems Security Professional Official Study Guide
    2024年
    How Cybersecurity Really Works How Cybersecurity Really Works
    2021年
    The Official (ISC)2 CISSP CBK Reference The Official (ISC)2 CISSP CBK Reference
    2021年
    Destination CISSP Destination CISSP
    2024年
    Foundations of Information Security Foundations of Information Security
    2019年
    The Myth of the Secure OS The Myth of the Secure OS
    2012年
    The Path of Least Resistance: Computer Security Is Common Sense The Path of Least Resistance: Computer Security Is Common Sense
    2012年
    Conflicts of Interest Conflicts of Interest
    2012年
    Lucrarea autentică Lucrarea autentică
    2025年
    Îndreptățit înaintea lui Dumnezeu Îndreptățit înaintea lui Dumnezeu
    2025年
    Fariseos evangélicos Fariseos evangélicos
    2023年
    Information Security Management - ITP 370 Information Security Management - ITP 370
    2014年
    The State of Risk-Based Security Management The State of Risk-Based Security Management
    2012年
    Hacked?! Hacked?!
    2015年
    Anatomy of a Phish Anatomy of a Phish
    2014年
    Protecting Virtual Datacenters Protecting Virtual Datacenters
    2012年
    Addressing Emerging Threats and Targeted Attacks with IBM Security Network Protection Addressing Emerging Threats and Targeted Attacks with IBM Security Network Protection
    2014年