
Security
About this book
This pocket guide is based on the approach used by BT to protect its own data security - one that draws on the capabilities of both people and technology. The guide will prove invaluable for IT managers, information security officers and business executives.
Subjects
ManagementNetworkingComputer networksCOMPUTERSGeneralBusiness enterprisesComputer scienceInternetSecuritySecurity measuresInformation technologyInformation technology, managementBusiness enterprises, computer networksComputer networks, security measures