Information Technology Security. Advice from Experts
D
data encryption 3
data warehouse 4
denial of service (DoS) 3, 44, 121
deterrence-based trust 89
digital information 91
disaster recovery 67
disaster recovery plan 59
disaster recovery planning 104
Do Not Call list 11
dynamic host configuration protocol (DHCP) 127