Donny Koh

9%
Flag icon
Focused on Attackers Some organizations are able to identify potential attackers and can identify the threats they represent based on the attacker’s goals.
ISC2 CISSP Certified Information Systems Security Professional Official Study Guide
Rate this book
Clear rating