Synopses & Reviews
This guide helps you protect networks from unauthorized access. It discusses counter security threats, optimum use of encryption, integrity checks, and uniqueness mechanisms.
This practical guide presents a systematic approach designed to protect the smallest to the largest of networks from unauthorized access. It gives many proven techniques to render networks invulnerable to even the most determined hackers.
Includes bibliographical references (p. 233-235) and index.