Company network administrators are compelled today to aggressively pursue a robust network security regime. This book aims to give a strong, multi-disciplinary understanding of how to pursue this goal by introducing the technical issues surrounding security
Bibliography
Includes bibliographical references (pages 225-235) and index