This title teaches end-to-end network security concepts and techniques. It includes comprehensive information on how to design a comprehensive security defense model. It discloses how to develop and deploy computer, personnel, and physical security policies, how to design and manage authentication and authorization methods, and much more.
Other books by this author See all titles
You save: £4.01
You save: £1.80
You save: £2.70
This book can be found in...
The prices displayed are for website purchases only, and may differ to the prices in Waterstones shops.