Focuses mainly on communications and communication standards with emphasis also on risk analysis, ITSEC, EFT and EDI with numerous named viruses described. The dictionary contains extended essays on risk analysis, personal computing, key management, pin management and authentication.
Focuses mainly on communications and communication standards with emphasis also on risk analysis, ITSEC, EFT and EDI with numerous named viruses descr...
The purpose of this book is to answer the questions that all responsible managers are asking or will ask on the subject of information security. There are few managers with first hand experience of serious attacks or catastrophic occurrences with regard to integrated information systems.
The purpose of this book is to answer the questions that all responsible managers are asking or will ask on the subject of information security. There...