IWIA '04 Proceedings of the Second IEEE International Information Assurance Workshop (IWIA'04)
IWIA '04 Proceedings of the Second IEEE International Information Assurance Workshop (IWIA'04)
Using Honeynets to Protect Large Enterprise Networks
IEEE Security and Privacy
PRISM: A Preventive and Risk-Reducing Integrated Security Management Model Using Security Label
The Journal of Supercomputing
Getting a cybersecurity program started on low budget
Proceedings of the 43rd annual Southeast regional conference - Volume 1
Hi-index | 0.00 |
From the Publisher:This book is the most practical, comprehensive solution to defending your network perimeter. Get expert insight from the industry's leading voices: Stephen Northcutt and the expertise of the SANS team. Inside Network Perimeter Security is a practical guide to designing, deploying, and maintaining network defenses. It discusses perimeter components, such as firewalls, VPNs, routers, and intrusion detection systems, and it explains how to integrate them into a unified whole to meet real-world business requirements. Learn the best practices of perimeter defense from 17 information security professionals working together as a team of writers and reviewers. Because this book was developed in close coordination with the SANS Institute, it is also a valuable supplementary resource for those pursuing the GIAC Certified Firewall Analyst (GCFW) certification.