Donny Koh

8%
Flag icon
These similarities could include value, cost, sensitivity, risk, vulnerability, power, privilege, possible levels of loss or damage, or need to know.
ISC2 CISSP Certified Information Systems Security Professional Official Study Guide
Rate this book
Clear rating