This book explains how organisations can implement and maintain effective security practices to protect their web applications and the servers on which they reside as part of a wider information security management system by following the guidance set out in the international standard for informatio...
Full description