Browse
Search
Explore more content
auislandora_84393_OBJ.
pdf
(1.23 MB)
File info
Download file
Fullscreen
What to do before and after a cybersecurity breach?
Cite
Download
(1.23 MB)
Share
Embed
online resource
posted on 2023-08-04, 08:57
authored by
Gurpreet Dhillon
Description to be added
History
Publisher
Kogod Cybersecurity Governance Center, Kogod School of Business, American University
Handle
http://hdl.handle.net/1961/auislandora:84393
Usage metrics
Categories
No categories selected
Keywords
Cybersecurity
Licence
Copyright Undetermined
Exports
Select an option
RefWorks
BibTeX
Ref. manager
Endnote
DataCite
NLM
DC