Check nearby libraries
Buy this book
This edition doesn't have a description yet. Can you add one?
Check nearby libraries
Buy this book
| Edition | Availability |
|---|---|
| 1 |
aaaa
|
Book Details
Table of Contents
Modern network security threats
Securing network devices
Authentication, authorization, and accounting
Implementing firewall technologies
Implementing intrusion prevention
Securing the local area network
Cryptographic systems
Implementing virtual private networks
Managing a secure network.
Edition Notes
Classifications
The Physical Object
Edition Identifiers
Work Identifiers
Community Reviews (0)
History
- Created September 5, 2009
- 12 revisions
Wikipedia citation
×CloseCopy and paste this code into your Wikipedia page. Need help?
| March 28, 2025 | Edited by ImportBot | Redacting ocaids |
| December 8, 2022 | Edited by ImportBot | import existing book |
| November 18, 2022 | Edited by ImportBot | import existing book |
| November 1, 2022 | Edited by ImportBot | import existing book |
| September 5, 2009 | Created by ImportBot | Imported from Library of Congress MARC record |

