This specific ISBN edition is currently not available.View all copies of this ISBN edition:
Outlines practical solutions for reducing or eliminating the risk of illegal access and tampering with company computer data. The focus is on prevention: how to assess the company's vulnerability, how prevention programs work, and how they can be implemented and audited. The authors also explain how to detect perpetrators, and present guidelines on steps to take when an incident occurs. Distributed by TAB. Annotation copyright Book News, Inc. Portland, Or.
"synopsis" may belong to another edition of this title.
Book Description Tab Books, 1992. Hardcover. Condition: Acceptable. This is a used book. It may contain highlighting/underlining and/or the book may show heavier signs of wear . It may also be ex-library or without dustjacket. Seller Inventory # mon0001879506
Book Description Tab Books, 1992. Hardcover. Condition: Good. Item may show signs of shelf wear. Pages may include limited notes and highlighting. Includes supplemental or companion materials if applicable. Access codes may or may not work. Connecting readers since 1972. Customer service is our top priority. Seller Inventory # S_202179410
Book Description T A B Books. Hardcover. Condition: Good. Light shelf wear and minimal interior marks. Seller Inventory # G0830676643I3N00
Book Description Tab Books, 1992. Hardcover. Condition: Used: Acceptable. Hardback with dust jacket in good condition, but does have foxing on the fore edges, and dust jacket. Seller Inventory # NSSP80138795
Book Description Tab Books, 1992. Condition: Very Good. 1st ed. Ships from the UK. Great condition for a used book! Minimal wear. Seller Inventory # GRP96089548