Data Loss Prevention und Incident Response
Schutz vor Hackerangriffen
Description of book