UNIQUE FEATURE/RATIONALE
There are no current books that cover components of the architecture, design, theory, issues, challenges, and recommended policies for IM security. No book we know of addresses IM security in a manner useful for day-to-day operations and management of IM-capable networks in today s corporate environment.
* Up-to-date coverage of architecture, design, theory, issues, challenges, and recommended policies for IM security.
* Addresses IM security for day-to-day operations and management of IM-capable networks in today s corporate environment"
Or split into 4x interest-free payments of 25% on orders over R50
Learn more
UNIQUE FEATURE/RATIONALE
There are no current books that cover components of the architecture, design, theory, issues, challenges, and recommended policies for IM security. No book we know of addresses IM security in a manner useful for day-to-day operations and management of IM-capable networks in today s corporate environment.
* Up-to-date coverage of architecture, design, theory, issues, challenges, and recommended policies for IM security.
* Addresses IM security for day-to-day operations and management of IM-capable networks in today s corporate environment"
Imprint | Digital Press |
Country of origin | United Kingdom |
Release date | June 2005 |
Availability | Supplier out of stock. If you add this item to your wish list we will let you know when it becomes available. |
First published | July 2005 |
Authors | John Rittinghouse Phd Cism, James F. Ransome, PhD, CISM, CISSP |
Dimensions | 235 x 191 x 22mm (L x W x T) |
Format | Paperback |
Pages | 432 |
ISBN-13 | 978-1-55558-338-5 |
Barcode | 9781555583385 |
Categories | |
LSN | 1-55558-338-5 |