Presented to: Energy Innovations Laboratory. Information Security & Data Protection. Team-b Consultants SEC/332 May 5, 2014 Terence hunt, mccm ,. Overview. Title Topic 1. Topic 1. Title Topic 2. Topic 2. Title Topic 3. Topic 3. Conclusion. Questions. Reference.
Information Security & Data Protection
May 5, 2014
Terence hunt, mccm,
P. J. Ortmeier, P. (2013). Introduction to Security: Operations and Management,
(4th ed.). (E. Krassow, Ed.) Upper Saddle River, NJ, United States of America:
Prentice Hall. Retrieved March 30, 2014
Vellani, K. (2010, September 10). Vulnerability and Risk Assessment in the Environment of Care. Retrieved April 29, 2014, from http://www.threatanalysis.com/blog/?p=36