Image from Google Jackets

Network security bible / Eric Cole, Ronald L. Krutz, James W. Conley.

By: Cole, EricContributor(s): Krutz, Ronald L, 1938- | Conley, James WMaterial type: TextTextPublication details: Indianapolis, Ind. : Wiley, c2009Edition: 2nd editionDescription: xliv, 891 p. : ill. ; 24 cmISBN: 9780470502495 (pbk.) :; 0470502495 (pbk.) :Subject(s): Computer networks -- Security measuresDDC classification: 005.8 Summary: Covering techniques, technology, and methods for approaching security, this guide also examines trends and best practices being used by many organizations and covers core areas of network security and how they interrelate.
Holdings
Item type Current library Home library Shelving location Class number Status Date due Barcode Item reservations
Book Book Paul Hamlyn Library Paul Hamlyn Library Floor 1 005.8 COL (Browse shelf(Opens below)) Available 06314619
Book Book Paul Hamlyn Library Paul Hamlyn Library Floor 1 005.8 COL (Browse shelf(Opens below)) Available 06314627
Book Book Paul Hamlyn Library Paul Hamlyn Library Floor 1 005.8 COL (Browse shelf(Opens below)) Available 06314635
Book Book Paul Hamlyn Library Paul Hamlyn Library Floor 1 005.8 COL (Browse shelf(Opens below)) Available 06214460
Book Book Paul Hamlyn Library Paul Hamlyn Library Floor 1 005.8 COL (Browse shelf(Opens below)) Available 05912768
Total reservations: 0

Previous ed.: 2005.

Includes index.

Covering techniques, technology, and methods for approaching security, this guide also examines trends and best practices being used by many organizations and covers core areas of network security and how they interrelate.

Specialized.

There are no comments on this title.

to post a comment.