The book systematically presents the essential aspects and applicable procedures for planning secure information technology systems. It describes procedures and protocols in detail and explains them using case examples. The 10th edition covers impor
Read More
The book systematically presents the essential aspects and applicable procedures for planning secure information technology systems. It describes procedures and protocols in detail and explains them using case examples. The 10th edition covers impor
Read Less