The chapter discussed three ways to view the IT security function—as a police force, as a military organization, and as a loving mother. Name another view and describe why it is good.
What would happen if your employer/spouse/ roommate finds out you were using a keylogger to monitor their activities?
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here