© obpcnh/Shutterstock
CHAPTER 13 IT Security Policy Implementations
CHAPTER 14 IT Security Policy Enforcement
CHAPTER 15 IT Policy Compliance and Compliance Technologies