Item type | Current library | Call number | Copy number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|
![]() |
Jawaharlal Nehru Library | 005.8 BAS (Browse shelf(Opens below)) | NPH/24-25/IN-00605 05/03/2025 | Available | 393376 | ||
![]() |
Jawaharlal Nehru Library | 005.8 BAS (Browse shelf(Opens below)) | NPH/24-25/IN-00605 05/03/2025 | Available | 393377 |
Browsing Jawaharlal Nehru Library shelves Close shelf browser (Hides shelf browser)
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
||
005.8 Network defense and countermeasures | 005.8 EXPLORING ACCESS 2002 | 005.8 EXPLORING ACCESS 2002 | 005.8 BAS Cyber Security and Cyber Laws | 005.8 BAS Cyber Security and Cyber Laws | 005.8 MEN Cryptography, Network Security, and Cyber Laws | 005.8 MEN Cryptography, Network Security, and Cyber Laws |
This book is written to provide a large number of options for further study to students who desire an accurate and interesting introduction to the fascinating realm of network security, primarily intended for II- or III-year students interested in information technology, network security, network engineering and computer science. This work is designed to give students, professionals and hobbyists accurate and well-researched examples of current security topics, bring IT professionals up-to-date on the latest security concepts and provide value to the higher management.The field of information security changes quickly and this text is formulated to provide a solid foundation to enable the reader to understand and differentiate between hype and fact. The concepts and history of network development and network security as they have evolved are provided. This platform is anchored to real-world examples and techniques to glean the most useful information from the Internet. It bursts the mystique, shine a light on how and why people attack computer networks and prepares the reader with the right techniques to begin winning the network security game.
There are no comments on this title.