Amazon cover image
Image from Amazon.com

Securing an IT organization through governance, risk management, and audit Ken Sigler, Dr. James L. Rainey, III

By: Contributor(s): Material type: TextTextSeries: Publication details: Boca Raton : CRC Press, c2016.Description: xxviii, 367 p. : ill. ; 25 cmISBN:
  • 9781498737319
Subject(s): DDC classification:
  • 004.068
Online resources: Summary: Past events have shed light on the vulnerability of mission-critical computer systems at highly sensitive levels. It has been demonstrated that common hackers can use tools and techniques downloaded from the Internet to attack government and commercial information systems. Although threats may come from mischief makers and pranksters, they are more likely to result from hackers working in concert for profit, hackers working under the protection of nation states, or malicious insiders.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Status Date due Barcode
REGULAR University of Wollongong in Dubai Main Collection 004.068 SI SE (Browse shelf(Opens below)) Available T0035483

Past events have shed light on the vulnerability of mission-critical computer systems at highly sensitive levels. It has been demonstrated that common hackers can use tools and techniques downloaded from the Internet to attack government and commercial information systems. Although threats may come from mischief makers and pranksters, they are more likely to result from hackers working in concert for profit, hackers working under the protection of nation states, or malicious insiders.

There are no comments on this title.

to post a comment.