Donny Koh

7%
Flag icon
The operational managers or security professionals must then implement the configurations prescribed in the security management documentation. Finally, the end users must comply with all the security policies of the organization.
ISC2 CISSP Certified Information Systems Security Professional Official Study Guide
Rate this book
Clear rating