Information security analyst
dc.contributor.author | Mara, Wil | en_US |
dc.date.accessioned | 2016-06-10T08:32:17Z | |
dc.date.available | 2016-06-10T08:32:17Z | |
dc.date.issued | 2013 | en_US |
dc.identifier.other | HPU1160121 | en_US |
dc.identifier.uri | https://lib.hpu.edu.vn/handle/123456789/21174 | |
dc.description.abstract | Does this story sound like something out of a suspense movie? It’s not. The everyday responsibilities of being an information security analyst include tracking down people who violate security policies. The main goal of the information security business is preventing important information from falling into the wrong hands. | en_US |
dc.format.extent | 36 p. | en_US |
dc.format.mimetype | application/pdf | |
dc.language.iso | en | en_US |
dc.publisher | Cherry Lake Publishing | en_US |
dc.relation.ispartofseries | 21st Century Skills Library: Cool STEM Careers | en_US |
dc.subject | Information security | en_US |
dc.subject | Computer science | en_US |
dc.title | Information security analyst | en_US |
dc.type | Book | en_US |
dc.size | 2,286KB | en_US |
dc.department | English resources | en_US |
Files in this item
This item appears in the following Collection(s)
-
Technology [3030]