Advertisement

Table of contents

  1. Front Matter
    Pages i-xxvii
  2. Malcolm W. Harkins
    Pages 1-16 Open Access
  3. Malcolm W. Harkins
    Pages 17-29 Open Access
  4. Malcolm W. Harkins
    Pages 49-63 Open Access
  5. Malcolm W. Harkins
    Pages 65-80 Open Access
  6. Malcolm W. Harkins
    Pages 81-98 Open Access
  7. Malcolm W. Harkins
    Pages 99-116 Open Access
  8. Malcolm W. Harkins
    Pages 117-128 Open Access
  9. Malcolm W. Harkins
    Pages 139-153 Open Access
  10. Malcolm W. Harkins
    Pages 155-169 Open Access
  11. Back Matter
    Pages 171-186

About this book

Introduction

    

Keywords

governance risk assessment CISO vulnerabilities information security

Authors and affiliations

  • Malcolm W. Harkins
    • 1
  1. 1.FolsomUSA

Bibliographic information