The purpose of this Book is to explain the ways and means to protect computers from unauthorized access and tampering with them. Also it explains how to protect data and databases from hackers, as well as protect the computer network-especially private networks- from hacker attacks by activating and investing network protection protocols. This book has the lectures of forth stage in computer technical engineering.
Bitte wählen Sie Ihr Anliegen aus.
Rechnungen
Retourenschein anfordern
Bestellstatus
Storno