Business data networks and security
Business Data Networks and Security guides readers through the details of networking, while helping them train for the workplace. It starts with the basics of security and network design and management; goes beyond the basic topology and switch operation covering topics like VLANs, link aggregation,...
Saved in:
| Main Authors: | Panko, Raymond R. (Author), Panko, Julia L. (Author) |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Harlow
Pearson Education Limited
2015
|
| Edition: | Tenth edition, Global edition |
| Series: | Always learning
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
Applied network security master the art of detecting and averting advanced network security attacks and techniques
by: Salmon, Arthur, et al.
Published: (2017)
by: Salmon, Arthur, et al.
Published: (2017)
Corporate computer and network security
by: Panko lhRaymond R
by: Panko lhRaymond R
Corporate computer and network security
by: Panko, R. R.
Published: (2010)
by: Panko, R. R.
Published: (2010)
The management of network security technology, design, and management control
by: Carr, Houston H. 1937-
Published: (2010)
by: Carr, Houston H. 1937-
Published: (2010)
Corporate computer security
by: Boyle, Randall, et al.
Published: (2015)
by: Boyle, Randall, et al.
Published: (2015)
Learning network forensics identify and safeguard your network against both internal and external threats, hackers, and malware attacks
by: Datt, Samir
Published: (2016)
by: Datt, Samir
Published: (2016)
Cyber security economic strategies and public policy alternatives
by: Gallaher, Michael P.
Published: (2008)
by: Gallaher, Michael P.
Published: (2008)
Guide to network security
by: Whitman, Michael E., et al.
Published: (2013)
by: Whitman, Michael E., et al.
Published: (2013)
Secrets and lies digital security in a networked world
by: Schneier, Bruce 1963-
Published: (2000)
by: Schneier, Bruce 1963-
Published: (2000)
Practical Industrial Internet of Things security practitioner's guide to securing connected industries
by: Bhattacharjee, Sravani
Published: (2018)
by: Bhattacharjee, Sravani
Published: (2018)
Network security essentials applications and standards
by: Stallings, William
Published: (2014)
by: Stallings, William
Published: (2014)
Network security essentials applications and standards
by: Stallings, William
Published: (2007)
by: Stallings, William
Published: (2007)
Network and internetwork security principles and practice
by: Stallings, William
Published: (1995)
by: Stallings, William
Published: (1995)
Network security essentials applications and standards
by: Stallings, William
Published: (2017)
by: Stallings, William
Published: (2017)
Network security essentials Applications and standards
by: StallingslhWilliam
by: StallingslhWilliam
Network security know it all
Published: (2008)
Published: (2008)
Introduction to security and network forensics
by: Buchanan, William
Published: (2011)
by: Buchanan, William
Published: (2011)
Network security how to plan for it and achieve it
by: Baker
Published: (1995)
by: Baker
Published: (1995)
Network security architectures
by: Convery, Sean
Published: (2012)
by: Convery, Sean
Published: (2012)
Network Security Fundamentals
Published: (2008)
Published: (2008)
Network security current status and future directions
by: Douligeris
Published: (2007)
by: Douligeris
Published: (2007)
How to cheat at securing your network
Published: (2007)
Published: (2007)
Network security in the 90's issues and solutions for managers
by: Madron, Thomas William 1937-
Published: (1992)
by: Madron, Thomas William 1937-
Published: (1992)
Network security first step
by: Thomas ,Tom
Published: (2004)
by: Thomas ,Tom
Published: (2004)
CRYPTOGRAPHY AND NETWORK SECURITY : PRINCIPLES AND PRACTICE /
by: Stallings, William
Published: (2023)
by: Stallings, William
Published: (2023)
Data analysis for network cyber-security
Published: (2014)
Published: (2014)
The Tao of network security monitoring beyond intrusion detection
by: Bejtlich ,Richard
Published: (2005)
by: Bejtlich ,Richard
Published: (2005)
Inside network perimeter security the definitive guide to firewalls, VPNs, routers, and intrusion detection systems
by: Northcutt, Stephen, et al.
Published: (2005)
by: Northcutt, Stephen, et al.
Published: (2005)
Network security through data analysis from data to action
by: Collins, Michael (Michael Patrick)
Published: (2017)
by: Collins, Michael (Michael Patrick)
Published: (2017)
Network security essentials applications and standards
by: Stallings, William
Published: (2017)
by: Stallings, William
Published: (2017)
Zero trust networks building secure systems in untrusted networks
by: Gilman, Evan, et al.
Published: (2017)
by: Gilman, Evan, et al.
Published: (2017)
Building secure and reliable networks applications
by: Birman
Published: (1996)
by: Birman
Published: (1996)
Hardening network infrastructure
by: Noonan, Wesley J.
Published: (2004)
by: Noonan, Wesley J.
Published: (2004)
Network security, firewalls, and VPNs
by: Stewart, James Michael
Published: (2014)
by: Stewart, James Michael
Published: (2014)
Network attacks and exploitation a framework
by: Monte, Matthew
Published: (2015)
by: Monte, Matthew
Published: (2015)
Secure computer and network systems modeling, analysis and design
by: Ye
Published: (2008)
by: Ye
Published: (2008)
Guide to network defense and countermeasures
by: Weaver
Published: (2007)
by: Weaver
Published: (2007)
Cyber security management a governance, risk and compliance framework
by: Trim, Peter R. J., et al.
Published: (2014)
by: Trim, Peter R. J., et al.
Published: (2014)
Endpoint Security
by: Kadrich
Published: (2007)
by: Kadrich
Published: (2007)
Information security the complete reference
by: Rhodes-Ousley, Mark
Published: (2013)
by: Rhodes-Ousley, Mark
Published: (2013)
Similar Items
-
Applied network security master the art of detecting and averting advanced network security attacks and techniques
by: Salmon, Arthur, et al.
Published: (2017) -
Corporate computer and network security
by: Panko lhRaymond R -
Corporate computer and network security
by: Panko, R. R.
Published: (2010) -
The management of network security technology, design, and management control
by: Carr, Houston H. 1937-
Published: (2010) -
Corporate computer security
by: Boyle, Randall, et al.
Published: (2015)


