List price: $228.95
30 day, 100% satisfaction guarantee
If an item you ordered from TextbookRush does not meet your expectations due to an error on our part, simply fill out a return request and then return it by mail within 30 days of ordering it for a full refund of item cost.
Learn more about our returns policy
Description: Get the inside edge on the latest advances in the field of computer network security with the help of this new book! Comprehensive in scope, it is an essential guide to all facets of information security ranging from basic network technology to the broad applications of network security used in e-commerce, Internet security, and enterprise systems. Readers will learn about risk and threat analysis, as well as technologies such as access control, authentication, encryption, and key distribution. Planning, installing, and operating a secure system is also covered. Highlights include lessons learned from September 11, 2001. Coverage concludes with a look at future trends, including global terror and proactive solutions.
Rush Rewards U
You have reached 400 XP and carrot coins. That is the daily max!
Limited time offer:
Get the first one free!
All the information you need in one place! Each Study Brief is a summary of one specific subject; facts, figures, and explanations to help you learn faster.
List price: $228.95
Copyright year: 2005
Publisher: Delmar Cengage Learning
Publication date: 10/5/2004
Size: 7.25" wide x 9.00" long x 0.75" tall
|Basic Computer Technology|
|Introduction - From Teleprocessing to Client Server Computing|
|Operating Systems and Applications|
|Networks and Networking|
|Risk and Threat Analysis|
|Risk, Analysis, and Special Concerns|
|The technology of Security|
|PKI and Key Distribution|
|Security Devices and Software|
|Physical and Data Link Layer Security|
|Security at the Network Layer ? Internet Security|
|Application Level Security|
|Application and Service Supply Security|
|Security and E-commerce|
|Enterprise Systems and Solutions|
|The Telecommunications Industry|
|Planning Secure Systems and Implementing Effective Solutions|
|Planning for Security|
|Installation of a Secure System|
|Operating a Successful and Secure System|
|Operation and Support|
|Monitoring on Going Operation|
|Future Trends: Threats and Technologies|