- Secure proxies - the necessary extension of the endpoints
- Application identification and control - visualize the threats
- Malnets - where is the source of infection and who are the pathogens
- Identify the security breach - who was the victim and what was the lure
- Security in Mobile computing - SNAFU
With this book, you will be able to:
- Identify the relevant solutions to secure the infrastructure
- Construct policies that provide flexibility to the users so to ensure productivity
- Deploy effective defenses against the ever evolving web threats
- Implement solutions that are compliant to relevant rules and regulations
- Offer insight to developers who are building new security solutions and products
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in D ausgeliefert werden.