This book presents a framework to model the main activities of
information security management and governance. The same model can
be used for any security sub-domain such as cybersecurity, data
protection, access rights management, business continuity, etc.
General
Is the information for this product incomplete, wrong or inappropriate?
Let us know about it.
Does this product have an incorrect or missing image?
Send us a new image.
Is this product missing categories?
Add more categories.
Review This Product
No reviews yet - be the first to create one!