Donny Koh

9%
Flag icon
Focused on Assets This method uses asset valuation results and attempts to identify threats to the valuable assets.
ISC2 CISSP Certified Information Systems Security Professional Official Study Guide
Rate this book
Clear rating