We a good story
Quick delivery in the UK

Design of IT security policies

About Design of IT security policies

Computer systems, computer equipment, information generated by organisations, companies, educational establishments, etc., are of great importance and must be properly controlled and protected. An alternative is the implementation of computer security policies to guarantee business continuity. With the increase of the technological infrastructure of the University of Cuenca, the number of users, departmental divisions and communication equipment is increasing, which generates the need to implement new security mechanisms to maintain the integrity, availability and confidentiality of the information. The proper functioning of computer equipment, computer systems and communication equipment must be linked to a correct selection of controls that allow the institutional interests to be achieved.

Show more
  • Language:
  • English
  • ISBN:
  • 9786207132690
  • Binding:
  • Paperback
  • Pages:
  • 96
  • Published:
  • February 3, 2024
  • Dimensions:
  • 150x7x220 mm.
  • Weight:
  • 161 g.
Delivery: 1-2 weeks
Expected delivery: December 19, 2024
Extended return policy to January 30, 2025

Description of Design of IT security policies

Computer systems, computer equipment, information generated by organisations, companies, educational establishments, etc., are of great importance and must be properly controlled and protected. An alternative is the implementation of computer security policies to guarantee business continuity. With the increase of the technological infrastructure of the University of Cuenca, the number of users, departmental divisions and communication equipment is increasing, which generates the need to implement new security mechanisms to maintain the integrity, availability and confidentiality of the information. The proper functioning of computer equipment, computer systems and communication equipment must be linked to a correct selection of controls that allow the institutional interests to be achieved.

User ratings of Design of IT security policies



Join thousands of book lovers

Sign up to our newsletter and receive discounts and inspiration for your next reading experience.