Official (ISC)2  Guide to the CISSP CBK - Hal Tipton

Official (ISC)2 Guide to the CISSP CBK

By Hal Tipton

  • Release Date: 2012-12-12
  • Genre: Computers

Description

Security operations reflects the day to day operations of security within the organization. While "routine" may be used to describe security operations, it is anything but as almost all the action of an incident is detected in the operations group!

Comments