April 2016
Intermediate to advanced
337 pages
8h 22m
English
DOI: 10.1201/b11355-8
Trickery and treachery are the practices of fools that have not the wits enough to be honest.
Benjamin Franklin
Most security solutions directed at protecting data contained within the confines of an organization’s network are generally software centric. IT and IS professionals will labor for hours configuring firewalls, filtering traffic, and monitoring data packets to ensure proper network security. These same professionals will travel across the continent to attend security seminars in order to hone their technical prowess. Volume upon volume of books exist decrying the importance of a good technical defense, although only recently has the largest gap in the security ...