This book examines the cybersecurity phenomenon, looking at the folklore, the hype, and the behaviour of its practitioners. The content is strongly rooted in available research, presented in an accessible manner, with a number of business-related case studies.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.