Not a bad book, but leaves a lot to desire. There are some examples in the end of the book that justifies the title, nothing more.
There are currently no comments
required
required (not published)
optional
Information Security: Policies and Procedures
Comments
There are currently no comments
New Comment