Related Books
Language: en
Pages: 474
Pages: 474
Type: BOOK - Published: 2009-02-27 - Publisher: Pearson Education
The complete guide to today’s hard-to-defend chained attacks: performing them and preventing them Nowadays, it’s rare for malicious hackers to rely on just
Language: en
Pages: 336
Pages: 336
Type: BOOK - Published: 2003 - Publisher: Prentice Hall Professional
A guide to managing the process of securing an enterprise network, covering all aspects from perimeter security to application security.
Language: en
Pages: 381
Pages: 381
Type: BOOK - Published: 2018-09-04 - Publisher: Springer
This professional guide and reference examines the challenges of assessing security vulnerabilities in computing infrastructure. Various aspects of vulnerabilit
Language: en
Pages: 169
Pages: 169
Type: BOOK - Published: 2022-02-09 - Publisher: Springer Nature
This book offers a comprehensive overview of Software-Defined Network (SDN) based ad-hoc network technologies and exploits recent developments in this domain, w
Language: en
Pages: 192
Pages: 192
Type: BOOK - Published: 2024-04-30 - Publisher: John Wiley & Sons
Infuse efficiency into risk mitigation practices by optimizing resource use with the latest best practices in vulnerability management Organizations spend treme