Du er ikke logget ind
Beskrivelse
A practical guide, based on real-world experience of problem-solving in security situations, this work shows how many threats may be countered with good procedures, simple technology and easily-available hardware and software. It identifies potential weaknesses in and threats to the network, and evaluates the range of tools available - including hardware, software, access rights schemes and cryptographic methods - of keeping the network secure.