Sold Out
Book Categories |
Foreword by Lars Knudsen. Part I: Network Security Concepts. 1. Security Services and Cryptography. 2. Authentication and Key Management. 3. Computer Networks. 4. Taxonomy of Various Attacks. Part II: Kerberos and SESAME. 5. Kerberos. 6. SESAME. 7. Securing Applications with the GSS-API. Part III: Other Security Solutions. 8. Security Architectures. 9. Secure Internet Technologies. 10. Comparison of the Security Solutions. Appendices. References. Index.
Login|Complaints|Blog|Games|Digital Media|Souls|Obituary|Contact Us|FAQ
CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!! X
You must be logged in to add to WishlistX
This item is in your Wish ListX
This item is in your CollectionPractical intranet security
X
This Item is in Your InventoryPractical intranet security
X
You must be logged in to review the productsX
X
X
Add Practical intranet security, Foreword by Lars Knudsen Practical Intranet Security focuses on the various ways in which an intranet can be violated and gives a thorough review of the technologies that can be used by an organization to secure its intranet. This includes, for example, t, Practical intranet security to the inventory that you are selling on WonderClubX
X
Add Practical intranet security, Foreword by Lars Knudsen Practical Intranet Security focuses on the various ways in which an intranet can be violated and gives a thorough review of the technologies that can be used by an organization to secure its intranet. This includes, for example, t, Practical intranet security to your collection on WonderClub |