Become a Readings Member to make your shopping experience even easier. Sign in or sign up for free!

Become a Readings Member. Sign in or sign up for free!

Hello Readings Member! Go to the member centre to view your orders, change your details, or view your lists, or sign out.

Hello Readings Member! Go to the member centre or sign out.

Design of IT security policies
Paperback

Design of IT security policies

$253.99
Sign in or become a Readings Member to add this title to your wishlist.

Computer systems, computer equipment, information generated by organisations, companies, educational establishments, etc., are of great importance and must be properly controlled and protected. An alternative is the implementation of computer security policies to guarantee business continuity. With the increase of the technological infrastructure of the University of Cuenca, the number of users, departmental divisions and communication equipment is increasing, which generates the need to implement new security mechanisms to maintain the integrity, availability and confidentiality of the information. The proper functioning of computer equipment, computer systems and communication equipment must be linked to a correct selection of controls that allow the institutional interests to be achieved.

Read More
In Shop
Out of stock
Shipping & Delivery

$9.00 standard shipping within Australia
FREE standard shipping within Australia for orders over $100.00
Express & International shipping calculated at checkout

MORE INFO
Format
Paperback
Publisher
Our Knowledge Publishing
Date
4 February 2024
Pages
96
ISBN
9786207132690

Computer systems, computer equipment, information generated by organisations, companies, educational establishments, etc., are of great importance and must be properly controlled and protected. An alternative is the implementation of computer security policies to guarantee business continuity. With the increase of the technological infrastructure of the University of Cuenca, the number of users, departmental divisions and communication equipment is increasing, which generates the need to implement new security mechanisms to maintain the integrity, availability and confidentiality of the information. The proper functioning of computer equipment, computer systems and communication equipment must be linked to a correct selection of controls that allow the institutional interests to be achieved.

Read More
Format
Paperback
Publisher
Our Knowledge Publishing
Date
4 February 2024
Pages
96
ISBN
9786207132690