This book will allow to know the different theoretical references necessary to reach the design and construction of a cybersecurity framework, through the use of free software and emerging technologies. How was the selection of the different antecedents obtained, this was carried out through a search in different bibliographic sources in order to take up the most important and necessary to manage the different risks and threats that can be generated in any context.
ThriftBooks sells millions of used books at the lowest everyday prices. We personally assess every book's quality and offer rare, out-of-print treasures. We deliver the joy of reading in recyclable packaging with free standard shipping on US orders over $15. ThriftBooks.com. Read more. Spend less.