The process of network security: designing and managing a safe network
Presenting the process behind securing an enterprise network, this text includes information on the modelling behind the implementation. It offers a wide-ranging perspective on the many issues surrounding security within the workplace.
More Copies In Prospector
Loading Prospector Copies...
Reviews from GoodReads
Loading GoodReads Reviews.
|Grouped Work ID||e29e7368-2685-778a-cb02-5293797f5766|
|Grouping Title||process of network security designing and managing a safe network|
|Grouping Author||wadlow thomas a|
|Last Grouping Update||2018-10-10 01:06:21AM|
|Last Indexed||2020-01-21 03:46:09AM|
|author||Wadlow, Thomas A.|
|author_display||Wadlow, Thomas A|
|available_at_gcld||GRC Admin Office|
|detailed_location_gcld||GRC Admin Prof. Coll.|
|display_description||"n 520 1 "In The Process of Network Security, security specialist Thomas A. Wadlow reveals the approaches, techniques, and best practices that effectively secure the modern workplace. Written for network managers and administrators responsible for the security of large, enterprise-wide networks, this book focuses on security as a continuous process involving vigilant daily efforts in analysis, implementation, evaluation and maintenance. It also emphasizes that in order to truly protect the enterprise, security professionals must consider not just individual machines, but the entire system - machines, people, and procedures."--Cover, p. .|
|local_callnumber_gcld||PRO 005.8 WAD|
|owning_library_gcld||Grand County Library Dist|
|owning_location_gcld||GRC Admin Office|
|subject_facet||Computer networks -- Security measures|
|title_display||The process of network security : designing and managing a safe network|
|title_full||The process of network security : designing and managing a safe network / Thomas A. Wadlow|
|title_short||The process of network security|
|title_sub||designing and managing a safe network|