james

59%
Flag icon
Generation 1: Hardening the Host Generation 2: Protecting the Network Generation 3: Layered Defense and Active Response Generation 4: Automated Response Generation 5: Biological Defense
Enterprise Cybersecurity: How to Build a Successful Cyberdefense Program Against Advanced Threats
Rate this book
Clear rating