Listing 1 - 9 of 9 |
Sort by
|
Choose an application
Choose an application
Computer network architectures --- Computer networks --- Computernetwerken --- Computernetwerken--Architectuur --- Computers--Netwerken --- Ordinateurs--Réseaux --- Réseaux d'ordinateurs --- Réseaux d'ordinateurs--Architecture --- Computer network architectures. --- Computer networks. --- Réseaux informatiques
Choose an application
Choose an application
Bonnier, Albert, --- Bonnierföretagen. --- Albert Bonniers förlag. --- AB Bonnierföretagen.
Choose an application
Choose an application
Cybersecurity Operations Handbook is the first book for daily operations teams who install, operate and maintain a range of security technologies to protect corporate infrastructure. Written by experts in security operations, this book provides extensive guidance on almost all aspects of daily operational security, asset protection, integrity management, availability methodology, incident response and other issues that operational teams need to know to properly run security products and services in a live environment. Provides a master document on Mandatory FCC Best Practices and compl
Computer security. --- Computer networks --- Security measures. --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Security of computer systems --- Security measures --- Protection of computer systems --- Protection --- Computer security --- Data protection --- Security systems --- Hacking --- Information Technology --- General and Others
Choose an application
Networking Explained 2E offers a comprehensive overview of computer networking, with new chapters and sections to cover the latest developments in the field, including voice and data wireless networking, multimedia networking, and network convergence.Gallo and Hancock provide a sophisticated introduction to their subject in a clear, readable format. These two top networking experts answer hundreds of questions about hardware, software, standards, and future directions in network technology.Wireless networksConvergence of voice and dataMultimedia networking
Computer networks. --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Distributed processing --- Information Technology --- General and Others
Choose an application
Networking Explained 2E offers a comprehensive overview of computer networking, with new chapters and sections to cover the latest developments in the field, including voice and data wireless networking, multimedia networking, and network convergence. Gallo and Hancock provide a sophisticated introduction to their subject in a clear, readable format. These two top networking experts answer hundreds of questions about hardware, software, standards, and future directions in network technology. Wireless networks Convergence of voice and data Multimedia networking.
Choose an application
Cybersecurity Operations Handbook is the first book for daily operations teams who install, operate and maintain a range of security technologies to protect corporate infrastructure. Written by experts in security operations, this book provides extensive guidance on almost all aspects of daily operational security, asset protection, integrity management, availability methodology, incident response and other issues that operational teams need to know to properly run security products and services in a live environment. Provides a master document on Mandatory FCC Best Practices and complete coverage of all critical operational procedures for meeting Homeland Security requirements. First book written for daily operations teams Guidance on almost all aspects of daily operational security, asset protection, integrity management Critical information for compliance with Homeland Security.
Listing 1 - 9 of 9 |
Sort by
|