34,91 €
38,79 €
-10% with code: EXTRA
Technology Assessment
Technology Assessment
34,91
38,79 €
  • We will send in 10–14 business days.
Many cybersecurity technologies that can be used to protect critical infrastructures from cyber attack are currently available, while other technologies are still being researched and developed. These technologies, including access control technologies, system integrity technologies, cryptography, audit and monitoring tools, and configuration management and assurance technologies, can help to protect information that is being processed, stored, and transmitted in the networked computer systems…
  • SAVE -10% with code: EXTRA

Technology Assessment (e-book) (used book) | bookbook.eu

Reviews

Description

Many cybersecurity technologies that can be used to protect critical infrastructures from cyber attack are currently available, while other technologies are still being researched and developed. These technologies, including access control technologies, system integrity technologies, cryptography, audit and monitoring tools, and configuration management and assurance technologies, can help to protect information that is being processed, stored, and transmitted in the networked computer systems that are prevalent in critical infrastructures.

EXTRA 10 % discount with code: EXTRA

34,91
38,79 €
We will send in 10–14 business days.

The promotion ends in 20d.19:33:20

The discount code is valid when purchasing from 10 €. Discounts do not stack.

Log in and for this item
you will receive 0,39 Book Euros!?

Many cybersecurity technologies that can be used to protect critical infrastructures from cyber attack are currently available, while other technologies are still being researched and developed. These technologies, including access control technologies, system integrity technologies, cryptography, audit and monitoring tools, and configuration management and assurance technologies, can help to protect information that is being processed, stored, and transmitted in the networked computer systems that are prevalent in critical infrastructures.

Reviews

  • No reviews
0 customers have rated this item.
5
0%
4
0%
3
0%
2
0%
1
0%
(will not be displayed)