Securing the Network from Malicious Code

Securing the Network from Malicious Code

4.11 - 1251 ratings - Source

Cover procedures and practices for everything from social engineering to effectively configuring an intrusion detection system. * Author provides the benefit of his day-to-day practices as a security expert. * Companion Website features several non-shareware products for effectively defending against malicious code.In May 1998, telecommunications giants including Ericsson, IBM, Intel, Nokia, and Toshiba formed a group called the Bluetooth Special ... The inexpensive Bluetooth offers a short-range radio link between devices such as mobile phones , PDAs, laptops, fax ... This level of restriction is not the case with wireless networking.

Title:Securing the Network from Malicious Code
Author:Douglas Schweitzer
Publisher:Wiley - 2002-10-03


You Must CONTINUE and create a free account to access unlimited downloads & streaming