Managing Information Security offers focused coverage of how to protect mission critical systems, how to deploy security management systems, IT...
This book serves as a security practitioner’s guide to today’s most crucial issues in cyber security and IT infrastructure. It offers in-depth...
Managing Information Security offers focused coverage of how to protect mission critical systems, and how to deploy security management systems, IT...
Network and System Security provides focused coverage of network and system security technologies. It explores practical solutions to a wide range of...
Biometric Technologies and Verification Systems is organized into nine parts composed of 30 chapters, including an extensive glossary of biometric...
In this book, you will gain extensive hands-on experience installing and configuring a firewall. You will also learn how to allow access to key Web...
Presents information on how to analyze risks to your networks and the steps needed to select and deploy the appropriate countermeasures to reduce your...
The second edition of this comprehensive handbook of computer and information security provides the most complete view of computer security and...
Computer and Information Security Handbook, Third Edition, provides the most current and complete reference on computer security available in one...