IT Security Management

IT Securiteers - Setting up an IT Security Function

Nonfiction, Computers, Networking & Communications, Hardware, Advanced Computing, Computer Science, General Computing
Big bigCover of IT Security Management

More books from Springer Netherlands

bigCover of the book Dynamic Models of Advertising Competition by
bigCover of the book Mantle and Lower Crust Exposed in Oceanic Ridges and in Ophiolites by
bigCover of the book The Dependence Phenomenon by
bigCover of the book Echocardiography in Cardiac Interventions by
bigCover of the book In the Shadow of Descartes by
bigCover of the book Representational Ideas by
bigCover of the book Advanced Numerical Modeling and Data Assimilation Techniques for Tropical Cyclone Predictions by
bigCover of the book Cautionary Tales in the Ethics of Lifelong Learning Policy and Management by
bigCover of the book Conflict and Cooperation on the Scheldt River Basin by
bigCover of the book A History of Six Ideas by
bigCover of the book AthleticEnhancement, Human Nature and Ethics by
bigCover of the book Cost and Fee Allocation in Civil Procedure by
bigCover of the book Phenomenology and Beyond: The Self and Its Language by
bigCover of the book Essays on Pierre Bayle and Religious Controversy by
bigCover of the book The Imperial City of Potosí by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy