CART

(0) items

Corporate Computer Security,9780132145350
This item qualifies for
FREE SHIPPING!

FREE SHIPPING OVER $59!

Your order must be $59 or more, you must select US Postal Service Shipping as your shipping preference, and the "Group my items into as few shipments as possible" option when you place your order.

Bulk sales, PO's, Marketplace Items, eBooks, Apparel, and DVDs not included.

Corporate Computer Security

by ;
Edition:
3rd
ISBN13:

9780132145350

ISBN10:
0132145359
Media:
Hardcover
Pub. Date:
1/11/2012
Publisher(s):
Prentice Hall
List Price: $151.00

Buy New Textbook

Currently Available, Usually Ships in 24-48 Hours
$147.23

eTextbook

Downloadable Offline Access
 
Duration
Price
$67.44

Rent Textbook

We're Sorry
Sold Out

Used Textbook

We're Sorry
Sold Out

More New and Used
from Private Sellers
Starting at $94.61

Questions About This Book?

What version or edition is this?
This is the 3rd edition with a publication date of 1/11/2012.
What is included with this book?
  • The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any CDs, lab manuals, study guides, etc.

Related Products


  • Corporate Computer and Network Security
    Corporate Computer and Network Security
  • Corporate Computer and Network Security
    Corporate Computer and Network Security
  • Corporate Computer Security
    Corporate Computer Security
  • Early Edition Corporate Computer and Network Security
    Early Edition Corporate Computer and Network Security




Summary

A strong business focus through a solid technical presentation of security tools. Boyle/Panko provides a strong business focus along with a solid technical understanding of security tools. This text gives readers the IT security skills they need for the workplace. This edition is more business focused and contains additional hands-on projects, coverage of wireless and data security, and case studies.

Table of Contents

Chapter 1:  The Threat Environment

Chapter 2:  Planning and Policy

Chapter 3:  Cryptography

Chapter 4:  Secure Networks

Chapter 5:  Access Control

Chapter 6:  Firewalls

Chapter 7:  Host Hardening

Chapter 8:  Application Security

Chapter 9:  Data Protection

Chapter 10: Incident and Disaster Response



Please wait while the item is added to your cart...