© mirjanajovic/DigitalVision Vectors/Getty Images
CHAPTER 13 Information Security Governance
CHAPTER 14 Risk Analysis, Incident Response, and Contingency Planning
CHAPTER 15 Computer Forensics and Investigations