Security Vs. Convenience Security Vs. Convenience

Security Vs. Convenience

Publisher Description

The inter workings of computer security is often viewed as mysterious; however, nothing could be further from the truth.  Computer Security is Common Sense is a series of simple to follow books, each tackling a separate aspect of computer security.  Through use of analogies, these book help associate computer security practices with real life, everyday examples without sacrificing the accuracy of the technical details.  These books are perfect for non-technical manager, computer security novices, and systems administrators looking to broaden their knowledge.


Security vs. Convenience tackles the ever prominent balance between securing a network and its information and the business needs for which the network exists.

  • GENRE
    Computers & Internet
    RELEASED
    2012
    November 1
    LANGUAGE
    EN
    English
    LENGTH
    50
    Pages
    PUBLISHER
    Michael Reeves
    SELLER
    Michael Reeves
    SIZE
    12.4
    MB
    Cybersecurity Essentials Cybersecurity Essentials
    2018
    Network Security Bible Network Security Bible
    2011
    Mike Meyers' CompTIA Security+ Certification Guide, Second Edition (Exam SY0-501) Mike Meyers' CompTIA Security+ Certification Guide, Second Edition (Exam SY0-501)
    2017
    Official (ISC)2 Guide to the CISSP CBK Official (ISC)2 Guide to the CISSP CBK
    2012
    Pearson Practice Test Pearson Practice Test
    2020
    Mike Meyers' CompTIA Security+ Certification Guide, Third Edition (Exam SY0-601) Mike Meyers' CompTIA Security+ Certification Guide, Third Edition (Exam SY0-601)
    2021
    The Myth of the Secure OS The Myth of the Secure OS
    2012
    The Path of Least Resistance: Computer Security Is Common Sense The Path of Least Resistance: Computer Security Is Common Sense
    2012
    Conflicts of Interest Conflicts of Interest
    2012
    Delighting in the Trinity Delighting in the Trinity
    2012
    The Unquenchable Flame The Unquenchable Flame
    2010
    Enjoy Your Prayer Life Enjoy Your Prayer Life
    2014
    Information Security Management - ITP 370 Information Security Management - ITP 370
    2014
    The State of Risk-Based Security Management The State of Risk-Based Security Management
    2012
    Administration: Configuration and Security Administration: Configuration and Security
    2013
    Creating a Trusted Network for Homeland Security: Second Report of the Markle Foundation Task Force Creating a Trusted Network for Homeland Security: Second Report of the Markle Foundation Task Force
    2012
    Hacked?! Hacked?!
    2015
    Anatomy of a Phish Anatomy of a Phish
    2014