Course Technology. 4th edition, 2012 - 43 p.Describes the challenges of securing information. Information security. Why it is important. The types of attackers that are common today. The basic steps of an attack. Five basic principles of defense.
Sign up or login using form at top of the page to download this file.