Presented to: Energy Innovations Laboratory. Information Security & Data Protection. Team-b Consultants SEC/332 May 5, 2014 Terence hunt, mccm ,. Overview. Title Topic 1. Topic 1. Title Topic 2. Topic 2. Title Topic 3. Topic 3. Conclusion. Questions. Reference.
Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.
Information Security & Data Protection
May 5, 2014
Terence hunt, mccm,
P. J. Ortmeier, P. (2013). Introduction to Security: Operations and Management,
(4th ed.). (E. Krassow, Ed.) Upper Saddle River, NJ, United States of America:
Prentice Hall. Retrieved March 30, 2014
Vellani, K. (2010, September 10). Vulnerability and Risk Assessment in the Environment of Care. Retrieved April 29, 2014, from http://www.threatanalysis.com/blog/?p=36