Amazon cover image
Image from Amazon.com
Image from Google Jackets

Network Security : The Complete Refrence / Roberta Bragg...[et al.].

Contributor(s): Material type: TextTextLanguage: English Publication details: McGraw Hill Education (India) Pvt. Ltd. New Delhi 2004Description: Book xxxviii, 854p. : ill. ; 24cmISBN:
  • 9780070586710
Subject(s): DDC classification:
  • 23rd 005.8 BRA
Online resources:
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Status Notes Date due Barcode
Reference Book VIT-AP General Stacks Reference 005.8 BRA (Browse shelf(Opens below)) Not For Loan CSE 013184
Text Book School of Computer Science Section General Stacks In transit from VIT-AP to School of Computer Science Section since 2024-03-13 CSE 01229
Text Book VIT-AP General Stacks 005.8 BRA (Browse shelf(Opens below)) In transit from VIT-AP to School of Computer Science Section since 2024-11-05 CSE 01230
Text Book VIT-AP General Stacks 005.8 BRA (Browse shelf(Opens below)) In transit from VIT-AP to School of Computer Science Section since 2024-10-17 CSE 01231
Reference Book VIT-AP General Stacks Reference 005.8 BRA (Browse shelf(Opens below)) Not For Loan CSE 01234
Text Book VIT-AP General Stacks 005.8 BRA (Browse shelf(Opens below)) In transit from VIT-AP to School of Computer Science Section since 2025-05-09 CSE 01235
Text Book VIT-AP General Stacks 005.8 BRA (Browse shelf(Opens below)) In transit from VIT-AP to School of Computer Science Section since 2024-10-19 CSE 01236
Text Book VIT-AP General Stacks 005.8 BRA (Browse shelf(Opens below)) Available CSE 01237

It includes Glossary and Index Pages

Teaches end-to-end network security concepts and techniques. Includes comprehensive information on how to design a comprehensive security defense model. Plus, discloses how to develop and deploy computer, personnel, and physical security policies, how to design and manage authentication and authorization methods, and much more.

There are no comments on this title.

to post a comment.

Visitor Number:

Powered by Koha