354 26 9MB
English Pages 768 Year 2005
Report DMCA / Copyright
DOWNLOAD CHM FILE
543 72 6MB Read more
Network Perimeter Security: Building Defense In-Depth reveals how readers can evaluate the security needs of their netwo
317 91 4MB Read more
As an IT professional, you need to know how to perform network security assessments. Inside Network Security Assessments
373 31 2MB Read more
n this book, two senior members of Microsoft's Security and Business Technology Unit present a complete "Defen
395 25 7MB Read more
SEC401.1: Network Security Essentials Overview A key way that attackers gain access to a company's resources is thr
593 103 64MB Read more
Corporate network security issues still very much fill the media today. "Designing Network Security" offers a
173 99 4MB Read more
All companies rely on some security mechanisms to ensure their corporate privacy and information integrity. In many case
481 21 9MB Read more
194 10 907KB Read more
As an IT professional, you need to know how to perform network security assessments. Inside "Network Security Asses
339 3 3MB Read more
InTech, 2012. — 390 p.We live in an era of unimaginably rapidly advancing and amazing technologies that enable instantan
701 62 5MB Read more