Description
This no-nonsense guide is designed to protect the smallest to the largest of networks from unauthorized access. Learn how to counter security threats and make optimum use of encryption, integrity checks, uniqueness mechanisms, and security management.
Table Of Contents
Security Threats, Services, and Mechanisms. Security Procedures. Security Management. Algorithms. OSI and Security. Applications, Systems, Products, and Architectures. Conclusion. Appendices.