FoxPro 2.5 Programmers Reference(Win|DOS),Hawkins 1565292103€ 18,00
Network Security How to Plan for It & Achieve It 0070051410
280depuis 11 févr.. '25, 06:10
Image not available
€ 32,00
Enlèvement ou Envoi
Verzenden voor € 4,78
Caractéristiques
Description
||boek: Network Security How to Plan for It and Achieve It|Richard H. Baker|McGraw-Hill
||taal: en
||jaar: 1995
||druk: ?
||pag.: 456p
||opm.: softcover|like new
||isbn: 0-07-005141-0
||code: 1:002669
--- Over het boek (foto 1): Network Security How to Plan for It and Achieve It ---
Best Ways To Protect You LAN! What's the fastest, easiest way to master all the new tools and techniques you need to maintain network security, reliability, and integrity? Richard Baker's Network Security! Inside you'll find low-cost, workable solutions for keeping your company's vital data and equipment safe from hackers, viruses, power failures, industrial spies, logic bombs, and a host of other new security threats. You'll learn to: build a security plan; assess risks; control physical access; build security procedures; master hardware and software security; overcome the perils of passwords; secure any desktop; protect and manage local area and enterprise networks; stay abreast of E-mail security/privacy issues and other legal problems; and much more.
[source: https--www.amazon.com]
||taal: en
||jaar: 1995
||druk: ?
||pag.: 456p
||opm.: softcover|like new
||isbn: 0-07-005141-0
||code: 1:002669
--- Over het boek (foto 1): Network Security How to Plan for It and Achieve It ---
Best Ways To Protect You LAN! What's the fastest, easiest way to master all the new tools and techniques you need to maintain network security, reliability, and integrity? Richard Baker's Network Security! Inside you'll find low-cost, workable solutions for keeping your company's vital data and equipment safe from hackers, viruses, power failures, industrial spies, logic bombs, and a host of other new security threats. You'll learn to: build a security plan; assess risks; control physical access; build security procedures; master hardware and software security; overcome the perils of passwords; secure any desktop; protect and manage local area and enterprise networks; stay abreast of E-mail security/privacy issues and other legal problems; and much more.
[source: https--www.amazon.com]
Numéro de l'annonce: m2233914639
Mots-clés populaires
cours informatiqueInformatique & Ordinateurlivres informatiquecours informatiquebody to body massage dans Langue | Anglaisplan bruxelles dans Atlas & Cartes géographiquesmon 2émemain dans BDtea for one dans Langue | Anglaisstudio it dans Langue | Anglaisordinateur portable dans Ordinateurs portables Windowsplan de travail dans Cuisine | Éléments de cuisineplan de travail granit dans Cuisine | Éléments de cuisineordinateur plongee dans Plongéecroozer kid for 2 dans Accessoires vélo | Remorquesfourrure dans Tapis & Textilepoignee meuble dans Antiquités | Meubles | Armoiresroulotte de chantier dans Abris de chantier & Baraques de chantierfigurine tintin dans BD | Comicscollier or homme dans Collierssneeuwwitje studio 100 dans DVD | Enfants & Jeunessetintin assis dans Personnages de BDvocabulaire francais dans Livres scolairespieces pour toyota avensis revise dans Autres pièces automobilespieces golf 4 tdi dans Autres pièces automobiles