Cargando…
Security: the human factor
This pocket guide is based on the approach used by BT to protect its own data security – one that draws on the capabilities of both people and technology. The guide will prove invaluable for IT managers, information security officers and business executives.
Autor principal: | |
---|---|
Lenguaje: | eng |
Publicado: |
IT Governance
2010
|
Materias: | |
Acceso en línea: | http://cds.cern.ch/record/1412787 |
_version_ | 1780923916492996608 |
---|---|
author | Kearney, Paul |
author_facet | Kearney, Paul |
author_sort | Kearney, Paul |
collection | CERN |
description | This pocket guide is based on the approach used by BT to protect its own data security – one that draws on the capabilities of both people and technology. The guide will prove invaluable for IT managers, information security officers and business executives. |
id | cern-1412787 |
institution | Organización Europea para la Investigación Nuclear |
language | eng |
publishDate | 2010 |
publisher | IT Governance |
record_format | invenio |
spelling | cern-14127872021-04-22T00:44:11Zhttp://cds.cern.ch/record/1412787engKearney, PaulSecurity: the human factorComputing and ComputersThis pocket guide is based on the approach used by BT to protect its own data security – one that draws on the capabilities of both people and technology. The guide will prove invaluable for IT managers, information security officers and business executives.IT Governanceoai:cds.cern.ch:14127872010 |
spellingShingle | Computing and Computers Kearney, Paul Security: the human factor |
title | Security: the human factor |
title_full | Security: the human factor |
title_fullStr | Security: the human factor |
title_full_unstemmed | Security: the human factor |
title_short | Security: the human factor |
title_sort | security: the human factor |
topic | Computing and Computers |
url | http://cds.cern.ch/record/1412787 |
work_keys_str_mv | AT kearneypaul securitythehumanfactor |