Security in an IPv6 Environment As the number of intelligent systems that require direct access expands to the multiple billions, Internet Protocol Version 6 (IPv6) becomes an institutional imperative. However, questions are being raised about security aspects and subtending apparatuses of IPv6. This book provides a practical and accessible primer on this emerging technology. The... Networking Explained, Second Edition Gallo and Hancock provide a sophisticated introduction to their subject in a clear, readable format. These two top networking experts answer hundreds of questions about hardware, software, standards, and future directions in network technology.
- Wireless networks
- Convergence of voice and data
Cybersecurity Operations Handbook Cybersecurity Operations Handbook is the first book for daily operations teams who install, operate and maintain a range of security technologies to protect corporate infrastructure. Written by experts in security operations, this book provides extensive guidance on almost all aspects of daily operational security, asset protection, integrity... Payment Card Industry Data Security Standard Handbook
Praise for Payment Card Industry Data Security Standard Handbook
"While providing insightful guidance on a holistic approach to tackling the Dirty Dozen of PCI, this book also teaches the fundamental principles of information security management. The PCI DSS Handbook is a must-read for all levels of...
Complete Guide to CISM Certification
Complete Guide to CISMÐ® Certification describes the tasks performed by information security managers and offers the necessary knowledge to manage, design, and oversee an information security program. The author explains each task and related knowledge statement, as well as applicable information security management principles, practices,...
|Result Page: 2 1 |