November 2004
Intermediate to advanced
448 pages
13h 56m
English
All the technological security marvels in the world are useless without proper accompanying physical security. While most companies implement some form of physical security, few take into account the many security vulnerabilities that exist in their environment. Take the time to think about physical security, document the vulnerabilities in your environment, and make business decisions about how to prevent those vulnerabilities from compromising the security of your company’s information systems.
Read now
Unlock full access