Given all of the changes in credit card processing in recent years with such features as wireless processing, the risk of the theft of otherwise legitimate credit card numbers stored in ... Maintain a policy that assesses information security.
|Title||:||Executive's Guide to IT Governance|
|Author||:||Robert R. Moeller|
|Publisher||:||John Wiley & Sons - 2013-01-29|