
This text is a unique guide for IT and security professionals who want to streamline security policy formulation. Providing recipes for policies in all areas from password and Internet use to intruder user detection, it offers all the ingredients for creating easily understood policies that protect an organization.
Page Count:
160
Publication Date:
2010-01-01
No comments yet. Be the first to share your thoughts!