Identifies, studies, and develops informative materials to improve the body of technologies, processes and practices to protect information technology assets such as networks, computers, programs and data from hostile attacks, damage or unauthorized access.
Verified
Group Publications
View Group & Members