Cargando…

Security: the human factor

This pocket guide is based on the approach used by BT to protect its own data security – one that draws on the capabilities of both people and technology. The guide will prove invaluable for IT managers, information security officers and business executives.

Detalles Bibliográficos
Autor principal: Kearney, Paul
Lenguaje:eng
Publicado: IT Governance 2010
Materias:
Acceso en línea:http://cds.cern.ch/record/1412787
_version_ 1780923916492996608
author Kearney, Paul
author_facet Kearney, Paul
author_sort Kearney, Paul
collection CERN
description This pocket guide is based on the approach used by BT to protect its own data security – one that draws on the capabilities of both people and technology. The guide will prove invaluable for IT managers, information security officers and business executives.
id cern-1412787
institution Organización Europea para la Investigación Nuclear
language eng
publishDate 2010
publisher IT Governance
record_format invenio
spelling cern-14127872021-04-22T00:44:11Zhttp://cds.cern.ch/record/1412787engKearney, PaulSecurity: the human factorComputing and ComputersThis pocket guide is based on the approach used by BT to protect its own data security – one that draws on the capabilities of both people and technology. The guide will prove invaluable for IT managers, information security officers and business executives.IT Governanceoai:cds.cern.ch:14127872010
spellingShingle Computing and Computers
Kearney, Paul
Security: the human factor
title Security: the human factor
title_full Security: the human factor
title_fullStr Security: the human factor
title_full_unstemmed Security: the human factor
title_short Security: the human factor
title_sort security: the human factor
topic Computing and Computers
url http://cds.cern.ch/record/1412787
work_keys_str_mv AT kearneypaul securitythehumanfactor