Research on Internet security over the past few decades has focused mainly on information assurance, issues of data confidentiality and integrity as explored th
Plug the gaps in your network’s infrastructure with resilient network security models Key FeaturesDevelop a cost-effective and end-to-end vulnerability manage
This is the only computer book to focus completely on infrastucture security: network devices, protocols and architectures. It offers unique coverage of network
As the sophistication of cyber-attacks increases, understanding how to defend critical infrastructure systems—energy production, water, gas, and other vital s
The perimeter defenses guarding your network perhaps are not as secure as you think. Hosts behind the firewall have no defenses of their own, so when a host in