catalog
Please complete the inquiry form to access eBook details
-
What are the types of information security? A clear explanation of technical, physical, organizational, and human measures.
Contact this catalog
-
A detailed explanation of the point "Network Key" for maintaining a safe internet environment!
Contact this catalog
-
-
What are the risks lurking in cloud security? An explanation of the measures that server administrators should take!
Contact this catalog
-
Is "garbage" being targeted? Three tactics of trashing and measures you can take right now.
Contact this catalog
-
Protecting Against Robocall Scam Calls: Practical Security Measures for Businesses
Contact this catalog
-
-
-
-
-
What is the duration and required documents for the ISMS audit? Explanation of cases of failure and countermeasures.
Contact this catalog
-
-
What is a DDoS attack? A complete explanation of distributed denial-of-service attacks that even beginners can understand.
Contact this catalog
-
-
What is an information security policy? An explanation of its contents and operational methods!
Contact this catalog
-
-
Learn from domestic cases! Consider what should be done now based on the causes of information leaks.
Contact this catalog
-
Purpose, Implementation Methods, and Actual Process of Internal Audits <P Mark>
Contact this catalog
-
-
The three basic elements of information security, "CIA," and four new elements.
Contact this catalog
-
-
A thorough explanation of the flow and methods for managing outsourced partners to protect privacy.
Contact this catalog
-
-
What rules should companies with P Mark certification follow for password management?
Contact this catalog
-
-
Examples of what constitutes personal information under the P Mark, categorized by industry.
Contact this catalog
-
-
-
-