New methods of breaking into corporate networks are resulting in major losses. This book provides the latest information on how to guard against attacks and inform the IT manager of the products that can detect and prevent break-ins. Methods for authentication and encryption are explained, enabling the reader to understand when and where these developments apply. The latest incident handling procedures for detecting and recovering data from new viruses,...
Related Subjects
Architecture Buildings Chemical Consumer Guides Design & Construction Earth Sciences Education & Reference Energy Efficiency Engineering Environmental Science Home & Garden Home Decorating & Design House & Home Science Science & Math Science & Scientists Science & Technology Technology