Menu Close

More Books:

Working Around Disruptions of Network Infrastructures
Language: en
Pages: 188
Authors: Amro Al-Akkad
Categories: Computers
Type: BOOK - Published: 2016-02-22 - Publisher: Springer

As in disasters the availability of information and communication technology services can be severely disrupted, the author explores challenges and opportunities to work around such disruptions. He therefore empirically analyzes how people in disasters use remnants of technology to still communicate their needs. Based on this, he suggests quality attributes
An Intrusion Tolerance Approach for Protecting Network Infrastructures
Language: en
Pages: 264
Authors: Steven Cheung
Categories: Computers
Type: BOOK - Published: 1999 - Publisher:

Books about An Intrusion Tolerance Approach for Protecting Network Infrastructures
MCSE: Windows 2000 Network Infrastructure Design Study Guide
Language: en
Pages: 720
Authors: William Heldman
Categories: Computers
Type: BOOK - Published: 2006-02-20 - Publisher: John Wiley & Sons

Books about MCSE: Windows 2000 Network Infrastructure Design Study Guide
Security Sage's Guide to Hardening the Network Infrastructure
Language: en
Pages: 608
Authors: Steven Andres, Brian Kenyon, Erik Pack Birkholz
Categories: Computers
Type: BOOK - Published: 2004-05-05 - Publisher: Elsevier

This is the only computer book to focus completely on infrastucture security: network devices, protocols and architectures. It offers unique coverage of network design so administrators understand how they should design and protect their enterprises. Network security publishing has boomed in the last several years with a proliferation of materials
Securing Network Infrastructure
Language: en
Pages: 538
Authors: Sairam Jetty, Sagar Rahalkar
Categories: Computers
Type: BOOK - Published: 2019-03-26 - Publisher: Packt Publishing Ltd

Plug the gaps in your network’s infrastructure with resilient network security models Key Features Develop a cost-effective and end-to-end vulnerability management program Explore best practices for vulnerability scanning and risk assessment Understand and implement network enumeration with Nessus and Network Mapper (Nmap) Book Description Digitization drives technology today, which is