Norges billigste bøker

Design of IT security policies

Om Design of IT security policies

Computer systems, computer equipment, information generated by organisations, companies, educational establishments, etc., are of great importance and must be properly controlled and protected. An alternative is the implementation of computer security policies to guarantee business continuity. With the increase of the technological infrastructure of the University of Cuenca, the number of users, departmental divisions and communication equipment is increasing, which generates the need to implement new security mechanisms to maintain the integrity, availability and confidentiality of the information. The proper functioning of computer equipment, computer systems and communication equipment must be linked to a correct selection of controls that allow the institutional interests to be achieved.

Vis mer
  • Språk:
  • Engelsk
  • ISBN:
  • 9786207132690
  • Bindende:
  • Paperback
  • Sider:
  • 96
  • Utgitt:
  • 4. februar 2024
  • Dimensjoner:
  • 150x7x220 mm.
  • Vekt:
  • 161 g.
  Gratis frakt
Leveringstid: 2-4 uker
Forventet levering: 28. desember 2024
Utvidet returrett til 31. januar 2025

Beskrivelse av Design of IT security policies

Computer systems, computer equipment, information generated by organisations, companies, educational establishments, etc., are of great importance and must be properly controlled and protected. An alternative is the implementation of computer security policies to guarantee business continuity. With the increase of the technological infrastructure of the University of Cuenca, the number of users, departmental divisions and communication equipment is increasing, which generates the need to implement new security mechanisms to maintain the integrity, availability and confidentiality of the information. The proper functioning of computer equipment, computer systems and communication equipment must be linked to a correct selection of controls that allow the institutional interests to be achieved.

Brukervurderinger av Design of IT security policies



Gjør som tusenvis av andre bokelskere

Abonner på vårt nyhetsbrev og få rabatter og inspirasjon til din neste leseopplevelse.