Official (ISC)2 Guide to the CISSP CBK
By Hal Tipton
- Release Date: 2012-12-12
- Genre: Computers
Description
Security operations reflects the day to day operations of security within the organization. While "routine" may be used to describe security operations, it is anything but as almost all the action of an incident is detected in the operations group!