Search

The Weak link in IT security

Fichero PDF / PDF file
MAP20071505659
Wade, Jared
The Weak link in IT security / Jared Wade
Increasingly powerful IT applications have become the mainstay of modern business technology. The risk of viruses, unauhorized data access and electronic vandalims, however, all make strong IT a must. Nevertheless, most employees still understand very little about computer viruses, how they work or where they come from
En: Risk management. - New York. - nº 7, July 2004 ; p. 32-37
1. Seguridad informática . 2. Nuevas tecnologías . 3. Virus informáticos . 4. Hackers . 5. Empresas . I. Title. II. Título: Risk management.