|
|
|||
|
||||
OverviewOrganizational computing devices are increasingly becoming targets of cyber-attacks, and organizations have become dependent on the safety and security of their computer networks and their organizational computing devices. Business and government often use defense in-depth information assurance measures such as firewalls, intrusion detection systems, and password procedures across their enterprises to plan strategically and manage IT security risks. This quantitative study explores whether the analytical hierarchy process (AHP) model can be effectively applied to the prioritization of information assurance defense in-depth measures. Full Product DetailsAuthor: Rodney AlexanderPublisher: Outskirts Press Imprint: Outskirts Press Dimensions: Width: 17.80cm , Height: 0.40cm , Length: 25.40cm Weight: 0.150kg ISBN: 9781478787921ISBN 10: 1478787929 Pages: 78 Publication Date: 31 March 2017 Audience: General/trade , General Format: Paperback Publisher's Status: Active Availability: In stock We have confirmation that this item is in stock with the supplier. It will be ordered in for you and dispatched immediately. Table of ContentsReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |