Official (ISC)2  Guide to the CISSP CBK by Hal Tipton

Official (ISC)2 Guide to the CISSP CBK

By

  • Genre Computers
  • Released
  • Size 2.96 MB

Description

Security operations reflects the day to day operations of security within the organization. While "routine" may be used to describe security operations, it is anything but as almost all the action of an incident is detected in the operations group!

More Hal Tipton Books