Surviving Security addresses a breadth of security technologies and processes, including policy, encryption, physical security, and maintenance, while continually answering the following questions that are critical to network administrators and managers: Why is this technology/practice important to a security infrastructure? How does this fit into the larger security layer model? What different options-technology and vendor-are available for this area (vendor-specific reviews will be placed primarily on the companion web ...
Read More
Surviving Security addresses a breadth of security technologies and processes, including policy, encryption, physical security, and maintenance, while continually answering the following questions that are critical to network administrators and managers: Why is this technology/practice important to a security infrastructure? How does this fit into the larger security layer model? What different options-technology and vendor-are available for this area (vendor-specific reviews will be placed primarily on the companion web site) and what is the cost of implementing these options?
Read Less
Choose your shipping method in Checkout. Costs may vary based on destination.
Seller's Description:
Good. Connecting readers with great books since 1972! Used textbooks may not include companion materials such as access codes, etc. May have some wear or writing/highlighting. We ship orders daily and Customer Service is our top priority!