Marknadens största urval
Snabb leverans

Design of IT security policies

Om Design of IT security policies

Computer systems, computer equipment, information generated by organisations, companies, educational establishments, etc., are of great importance and must be properly controlled and protected. An alternative is the implementation of computer security policies to guarantee business continuity. With the increase of the technological infrastructure of the University of Cuenca, the number of users, departmental divisions and communication equipment is increasing, which generates the need to implement new security mechanisms to maintain the integrity, availability and confidentiality of the information. The proper functioning of computer equipment, computer systems and communication equipment must be linked to a correct selection of controls that allow the institutional interests to be achieved.

Visa mer
  • Språk:
  • Engelska
  • ISBN:
  • 9786207132690
  • Format:
  • Häftad
  • Sidor:
  • 96
  • Utgiven:
  • 4. februari 2024
  • Mått:
  • 150x7x220 mm.
  • Vikt:
  • 161 g.
  Fri leverans
Leveranstid: 2-4 veckor
Förväntad leverans: 30. december 2024
Förlängd ångerrätt till 31. januari 2025

Beskrivning av Design of IT security policies

Computer systems, computer equipment, information generated by organisations, companies, educational establishments, etc., are of great importance and must be properly controlled and protected. An alternative is the implementation of computer security policies to guarantee business continuity. With the increase of the technological infrastructure of the University of Cuenca, the number of users, departmental divisions and communication equipment is increasing, which generates the need to implement new security mechanisms to maintain the integrity, availability and confidentiality of the information. The proper functioning of computer equipment, computer systems and communication equipment must be linked to a correct selection of controls that allow the institutional interests to be achieved.

Användarnas betyg av Design of IT security policies



Gör som tusentals andra bokälskare

Prenumerera på vårt nyhetsbrev för att få fantastiska erbjudanden och inspiration för din nästa läsning.