9781466609785-1466609788-Threats, Countermeasures, and Advances in Applied Information Security

Threats, Countermeasures, and Advances in Applied Information Security

ISBN-13: 9781466609785
ISBN-10: 1466609788
Edition: 1
Author: Manish Gupta, Raj Sharman, John Walp
Publication date: 2012
Publisher: Information Science Reference
Format: Hardcover 548 pages
FREE US shipping
Buy

From $189.28

Book details

ISBN-13: 9781466609785
ISBN-10: 1466609788
Edition: 1
Author: Manish Gupta, Raj Sharman, John Walp
Publication date: 2012
Publisher: Information Science Reference
Format: Hardcover 548 pages

Summary

Threats, Countermeasures, and Advances in Applied Information Security (ISBN-13: 9781466609785 and ISBN-10: 1466609788), written by authors Manish Gupta, Raj Sharman, John Walp, was published by Information Science Reference in 2012. With an overall rating of 3.7 stars, it's a notable title among other Leadership & Motivation (Management & Leadership, Management Information Systems, Business Technology, Network Security, Security & Encryption) books. You can easily purchase or rent Threats, Countermeasures, and Advances in Applied Information Security (Hardcover) from BooksRun, along with many other new and used Leadership & Motivation books and textbooks. And, if you're looking to sell your copy, our current buyback offer is $0.3.

Description

Organizations are increasingly relying on electronic information to conduct business, which has caused the amount of personal information to grow exponentially.Threats, Countermeasures, and Advances in Applied Information Security addresses the fact that managing information security program while effectively managing risks has never been so critical. This book contains 24 chapters on the most relevant and important issues and advances in applied information security management. The chapters are authored by leading researchers and practitioners in the field of information security from across the globe. The chapters represent emerging threats and countermeasures for effective management of information security at organizations.
Rate this book Rate this book

We would LOVE it if you could help us and other readers by reviewing the book