This no-nonsense guide is designed to protect the smallest to the largest of networks from unauthorized access. Learn how to counter security threats and make optimum use of encryption, integrity checks, uniqueness mechanisms, and security management.
Security Threats, Services, and Mechanisms. Security Procedures. Security Management. Algorithms. OSI and Security. Applications, Systems, Products, and Architectures. Conclusion. Appendices.