Teaches end-to-end network security concepts and techniques. Includes comprehensive information on how to design a comprehensive security defense model. Plus, discloses how to develop and deploy computer, personnel, and physical security policies, how to design and manage authentication and authorization methods, and much more.
Paperback, 854 pages
Published November 10th 2003 by McGraw-Hill/Osborne Media
To see what your friends thought of this book, please sign up.
(showing 1-30 of 35)