|NOM DE FICHIER||The secured enterprise. Protecting your informaton assets.pdf|
|TAILLE DU FICHIER||8,27 MB|
|DATE DE PUBLICATION||2002-Apr-30|
Secure Your Information: Information Security Principles for Enterprise Architecture Report June 2007 DISCLAIMER: To the extent permitted by law, this document is provided without any liability or warranty. Accordingly it is to be used only for the purposes specified and the reliability of any assessment or evaluation arising from it are matters for the independent judgment of users. This ...
Information Systems Security Certifications Consortium, Inc. (ISC2), "as Internet security threats continue to rise, many organizations have unwisely focused on technology solutions alone in protecting information assets" (2001, p. 13). Companies can have confidence in the abilities of their associates when they