作者: Alan Schwartz , Alan Greenberg , George Sadowsky , James X. Dempsey , Barbara J. Mack
DOI:
关键词:
摘要: … Part 2 covers these security issues and mitigation techniques in technical detail, with the individual user in mind; Part 3 looks at security from an organizational perspective. …