Improving computer ethics video clips for higher education
Proceedings of the 36th annual ACM SIGUCCS fall conference: moving mountains, blazing trails
Firewalls - Are they enough protection for current networks?
Information Security Tech. Report
A fuzzy-based en-route filtering scheme in sensor networks
ICIC'07 Proceedings of the intelligent computing 3rd international conference on Advanced intelligent computing theories and applications
Hi-index | 0.00 |
From the Publisher:Surviving Security is your guide to formulating a security strategy that fits your company's business and budget needs. Network and information security is no longer optional in today's connected business environment, but finding the right combination of technology and processes for your needs can be an overwhelming and frustrating process. This book is an essential tool for network managers and administrators who need to implement a security infrastructure, understand how different security technologies work together, develop or revise security processes, make purchasing decisions, or hire a security consultant or outsourcing firm.