Cargando…
Inside network perimeter security
Autor principal: | Northcutt, Stephen |
---|---|
Lenguaje: | eng |
Publicado: |
Sams Pub.
2005
|
Materias: | |
Acceso en línea: | http://cds.cern.ch/record/1509999 |
Ejemplares similares
-
Securing the perimeter: deploying identity and access management with free open source software
por: Schwartz, Michael, et al.
Publicado: (2018) -
Protect your windows network: from perimeter to data
por: Johansson, Jesper M, et al.
Publicado: (2005) -
Inside network security assessment: guarding your IT infrastructure
por: Gregg, Michael, et al.
Publicado: (2005) -
Cyber warfare: techniques, tactics and tools for security practitioners
por: Andress, Jason, et al.
Publicado: (2011) -
Information systems and security: insider threats
por: Arduin, Pierre-Emmanuel, et al.
Publicado: (2018)