

Beschreibung
The book systematically describes which aspects are important in the planning of secure information technology systems and which different approaches can be taken. It presents procedures and protocols, in detail and explains them with case studies. The 11th e...