Knowledge Resources | Dar Al-hikmah Library | Public Access
Subject(s): Business enterprises -- Computer networks Security measures | Electronic commerce -- Security measures | Computer security | Data protection Contents:Identifying your information assets -- Determining your current vulnerabilities -- Start by protecting your computers -- Developing a security process based on trust -- Keeping in