This text reveals how readers can evaluate the security needs of their networks, develop a security policy for their companies, and create a budget based upon that policy. It assists them in designing the security model and outlines the testing process. Through the concepts and case studies presented in this book, they will learn to build a comprehensive perimeter defense architecture based upon multiple layers of protection, with expert recommendations for configuring firewalls, routers, intrusion detection systems, and other security tools and network components. This detailed volume enables readers to secure their networks on time, within budget, and without having to attain a security certification.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.