
![]() | 51.10kB |
![]() | 6.33kB |
![]() | 7.79kB |
![]() | 2.32kB |
![]() | 0.45kB |
![]() | 0.45kB |
![]() | 0.17kB |
![]() | 3.42kB |
![]() | 14.46kB |
![]() | 43.08kB |
![]() | 24.91kB |
![]() | 0.09kB |
![]() | 28.87kB |
![]() | 2.12kB |
![]() | 30.19kB |
![]() | 0.52kB |
![]() | 0.18kB |
![]() | 54.35kB |
![]() | 50.41kB |
![]() | 9.35kB |
![]() | 0.23kB |
![]() | 4.94kB |
![]() | 22.78kB |
![]() | 5.73kB |
![]() | 1.09MB |
![]() | 14.46kB |
![]() | 0.09kB |
![]() | 9.23kB |
![]() | 4.17kB |
![]() | 5.07kB |
![]() | 4.41kB |
![]() | 283.29kB |
![]() | 2.93kB |
![]() | 20.79kB |
![]() | 52.84kB |
![]() | 6.33kB |
![]() | 7.79kB |
![]() | 2.32kB |
![]() | 0.45kB |
![]() | 0.45kB |
![]() | 0.17kB |
![]() | 3.42kB |
![]() | 14.46kB |
![]() | 43.08kB |
![]() | 24.91kB |
![]() | 0.09kB |
![]() | 28.87kB |
![]() | 2.12kB |
![]() | 30.19kB |
Type: Course
Tags:
Bibtex:
Tags:
Bibtex:
@article{, title= {[Coursera] Designing and Executing Information Security Strategies}, keywords= {}, journal= {}, author= {Mike Simon (University of Washington)}, year= {2014}, url= {}, license= {}, abstract= {This course provides you with opportunities to integrate and apply your information security knowledge. Following the case-study approach, you will be introduced to current, real-world cases developed and presented by the practitioner community. You will design and execute information assurance strategies to solve these cases. }, superseded= {}, terms= {} }
No comments yet
Add a comment