Info hash | 55284a002672598923af36bc55f3205b42c93b00 |
Last mirror activity | 9d,23:53:51 ago |
Size | 1.01GB (1,007,286,635 bytes) |
Added | 2016-09-26 16:00:02 |
Views | 1853 |
Hits | 4813 |
ID | 3435 |
Type | multi |
Downloaded | 5651 time(s) |
Uploaded by | |
Folder | coursera-designing-and-executing-information-security-strategies |
Num files | 164 files [See full list] |
Mirrors | 14 complete, 0 downloading = 14 mirror(s) total [Log in to see full list] |

![]() |
51.10kB |
![]() |
6.33kB |
![]() |
7.79kB |
![]() |
2.32kB |
![]() |
0.45kB |
![]() |
0.45kB |
![]() |
0.17kB |
![]() |
3.42kB |
![]() |
14.46kB |
![]() |
43.08kB |
![]() |
24.91kB |
![]() |
0.09kB |
![]() |
28.87kB |
![]() |
2.12kB |
![]() |
30.19kB |
![]() |
0.52kB |
![]() |
0.18kB |
![]() |
54.35kB |
![]() |
50.41kB |
![]() |
9.35kB |
![]() |
0.23kB |
![]() |
4.94kB |
![]() |
22.78kB |
![]() |
5.73kB |
![]() |
1.09MB |
![]() |
14.46kB |
![]() |
0.09kB |
![]() |
9.23kB |
![]() |
4.17kB |
![]() |
5.07kB |
![]() |
4.41kB |
![]() |
283.29kB |
![]() |
2.93kB |
![]() |
20.79kB |
![]() |
52.84kB |
![]() |
6.33kB |
![]() |
7.79kB |
![]() |
2.32kB |
![]() |
0.45kB |
![]() |
0.45kB |
![]() |
0.17kB |
![]() |
3.42kB |
![]() |
14.46kB |
![]() |
43.08kB |
![]() |
24.91kB |
![]() |
0.09kB |
![]() |
28.87kB |
![]() |
2.12kB |
![]() |
30.19kB |
|
Type: Course
Tags:
Bibtex:
Tags:
Bibtex:
@article{, title= {[Coursera] Designing and Executing Information Security Strategies}, keywords= {}, journal= {}, author= {Mike Simon (University of Washington)}, year= {2014}, url= {}, license= {}, abstract= {This course provides you with opportunities to integrate and apply your information security knowledge. Following the case-study approach, you will be introduced to current, real-world cases developed and presented by the practitioner community. You will design and execute information assurance strategies to solve these cases. }, superseded= {}, terms= {} }