Articles
This chapter explains how to manage information security policies, describes roles and responsibilities related to information security, identifies the components of risk management, and shows how to create polices related to information security policy, governance, and risk management.
This chapter introduces the trusted computer base and the ways in which systems can be evaluated to assess the level of security to help you prepare for the CISSP exam.
Claudia Baca walks you through the steps of how you might proceed to build your study project to help you pass the Project Management Professional (PMBOK4) examination.
See More Articles