CART

(0) items

Corporate Computer Security

by ;
Edition:
3rd
ISBN13:

9780132145350

ISBN10:
0132145359
Format:
Hardcover
Pub. Date:
1/11/2012
Publisher(s):
Prentice Hall

Questions About This Book?

Why should I rent this book?
Renting is easy, fast, and cheap! Renting from eCampus.com can save you hundreds of dollars compared to the cost of new or used books each semester. At the end of the semester, simply ship the book back to us with a free UPS shipping label! No need to worry about selling it back.
How do rental returns work?
Returning books is as easy as possible. As your rental due date approaches, we will email you several courtesy reminders. When you are ready to return, you can print a free UPS shipping label from our website at any time. Then, just return the book to your UPS driver or any staffed UPS location. You can even use the same box we shipped it in!
What version or edition is this?
This is the 3rd edition with a publication date of 1/11/2012.
What is included with this book?
  • The Used copy of this book is not guaranteed to include any supplemental materials. Typically, only the book itself is included.
  • The Rental copy of this book is not guaranteed to include any supplemental materials. You may receive a brand new copy, but typically, only the book itself.

Related Products


  • Corporate Computer and Network Security
    Corporate Computer and Network Security
  • Corporate Computer and Network Security
    Corporate Computer and Network Security
  • Corporate Computer Security
    Corporate Computer Security
  • Early Edition Corporate Computer and Network Security
    Early Edition Corporate Computer and Network Security





Summary

A strong business focus through a solid technical presentation of security tools. Boyle/Panko provides a strong business focus along with a solid technical understanding of security tools. This text gives readers the IT security skills they need for the workplace. This edition is more business focused and contains additional hands-on projects, coverage of wireless and data security, and case studies.

Table of Contents

Chapter 1:  The Threat Environment

Chapter 2:  Planning and Policy

Chapter 3:  Cryptography

Chapter 4:  Secure Networks

Chapter 5:  Access Control

Chapter 6:  Firewalls

Chapter 7:  Host Hardening

Chapter 8:  Application Security

Chapter 9:  Data Protection

Chapter 10: Incident and Disaster Response



Please wait while the item is added to your cart...