Please use this identifier to cite or link to this item:
http://lib.hpu.edu.vn/handle/123456789/21174
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Mara, Wil | en_US |
dc.date.accessioned | 2016-06-10T08:32:17Z | |
dc.date.available | 2016-06-10T08:32:17Z | |
dc.date.issued | 2013 | en_US |
dc.identifier.other | HPU1160121 | en_US |
dc.identifier.uri | https://lib.hpu.edu.vn/handle/123456789/21174 | - |
dc.description.abstract | Does this story sound like something out of a suspense movie? It’s not. The everyday responsibilities of being an information security analyst include tracking down people who violate security policies. The main goal of the information security business is preventing important information from falling into the wrong hands. | en_US |
dc.format.extent | 36 p. | en_US |
dc.format.mimetype | application/pdf | - |
dc.language.iso | en | en_US |
dc.publisher | Cherry Lake Publishing | en_US |
dc.relation.ispartofseries | 21st Century Skills Library: Cool STEM Careers | en_US |
dc.subject | Information security | en_US |
dc.subject | Computer science | en_US |
dc.title | Information security analyst | en_US |
dc.type | Book | en_US |
dc.size | 2,286KB | en_US |
dc.department | English resources | en_US |
Appears in Collections: | Technology |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
12_Information_Security_Analyst.pdf Restricted Access | 2.29 MB | Adobe PDF | ![]() View/Open Request a copy |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.