Back to Results
First PageMeta Content
National security / Public safety / Information security / Computer security / Security policy / Security engineering / Dependability / Security / Prevention / Crime prevention


CHAPTER 27 Conclusions We are in the middle of a huge change in how security is done. Ten years ago, the security manager of a large company was usually a retired
Add to Reading List

Document Date: 2011-12-05 05:58:03


Open Document

File Size: 154,46 KB

Share Result on Facebook

Currency

USD / /

IndustryTerm

chief internal auditor / security printing people / hard technology / information security products / finance / insecure systems / communications confidentiality mechanisms / bank / data processing department / security technology / huge communications intelligence networks / /

Person

bin Laden / /

Position

chief internal auditor / teller / security engineer / manager of a large company / security manager / engineer / /

Technology

hard technology / operating system / operating systems / security technology / /

SocialTag