Corporate Computer and Network Security
Saved in:
Main Author: | |
---|---|
Format: | TEXT |
Published: |
Prentice Hall
|
Subjects: | |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
amikomlib-1996 |
---|---|
record_format |
oai_dc |
spelling |
amikomlib-19962016-08-08 00:00:00Resource Centre UNIVERSITAS AMIKOM YOGYAKARTACorporate Computer and Network SecurityRaymond R. PankoSynopsis: 1. Framework: Examples of Security. 2. Access Control and Site Security. 3. Review of TCP/IP Internetworking. 4. Attack Methods. 5. Firewalls. 6. Host Security. 7. The Elements of Cryptography. 8. Cryptographic Systems: SSL/TLS, VPNs, and KerberPrentice HallTEXT |
institution |
Universitas Amikom Yogyakarta |
collection |
Perpustakaan Yogyakarta |
topic |
Synopsis: 1. Framework: Examples of Security. 2. Access Control and Site Security. 3. Review of TCP/IP Internetworking. 4. Attack Methods. 5. Firewalls. 6. Host Security. 7. The Elements of Cryptography. 8. Cryptographic Systems: SSL/TLS, VPNs, and Kerber |
spellingShingle |
Synopsis: 1. Framework: Examples of Security. 2. Access Control and Site Security. 3. Review of TCP/IP Internetworking. 4. Attack Methods. 5. Firewalls. 6. Host Security. 7. The Elements of Cryptography. 8. Cryptographic Systems: SSL/TLS, VPNs, and Kerber Raymond R. Panko Corporate Computer and Network Security |
description |
|
format |
TEXT |
author |
Raymond R. Panko |
author_facet |
Raymond R. Panko |
author_sort |
Raymond R. Panko |
title |
Corporate Computer and Network Security |
title_short |
Corporate Computer and Network Security |
title_full |
Corporate Computer and Network Security |
title_fullStr |
Corporate Computer and Network Security |
title_full_unstemmed |
Corporate Computer and Network Security |
title_sort |
corporate computer and network security |
publisher |
Prentice Hall |
publishDate |
|
_version_ |
1742475454611193856 |