Join thousands of book lovers
Sign up to our newsletter and receive discounts and inspiration for your next reading experience.
By signing up, you agree to our Privacy Policy.You can, at any time, unsubscribe from our newsletters.
Includes a coverage of architecture, design, theory, issues, challenges, and recommended policies for IM security. This title addresses IM security for day-to-day operations and management of IM-capable networks in today's corporate environment.
Addresses the operational and day-to-day security management requirements of business stability and disaster recovery planning specifically tailored for the needs and requirements of an Information Security Officer. This book also provides critical strategies for maintaining basic business functions when and if systems are shut down.
Sign up to our newsletter and receive discounts and inspiration for your next reading experience.
By signing up, you agree to our Privacy Policy.