The security policy when using the Internet

Affiliates: 0,11 $how to earn
Pay with:
i agree with "Terms for Customers"
Sold: 0
Uploaded: 15.10.2006
Content: 132,55 kB


This book was written for those involved in the development of security policies at three levels:

Those from the upper-level management of the organization that need to understand some of the risks and consequences of the use of the Internet, so that they can appropriately allocate resources and delegate responsibility for certain questions.
The chiefs of organizational units that need to develop specific security policies
Organization Administrators who need to understand why they need to use certain software and hardware to protect and what are the reasons for the use of organizational measures and rules of the Internet, which they will need to educate Internet users in the organization.


No feedback yet.
In order to counter copyright infringement and property rights, we ask you to immediately inform us at the fact of such violations and to provide us with reliable information confirming your copyrights or rights of ownership. Email must contain your contact information (name, phone number, etc.)