Read Anywhere and on Any Device!

Subscribe to Read | $0.00

Join today and start reading your favorite books for Free!

Read Anywhere and on Any Device!

  • Download on iOS
  • Download on Android
  • Download on iOS

Department of Defense Information Security Report: The New Model for Protecting Networks Against Terrorist Threats

Department of Defense Information Security Report: The New Model for Protecting Networks Against Terrorist Threats

Cliff Wang
4.5/5 ( ratings)
After September 11th, the Department of Defense undertook a massive and classified research project to develop new security methods using technology in order to protect secret information from terrorist attacksWritten in language accessible to a general technical reader, this book examines the best methods for testing the vulnerabilities of networks and software that have been proven and tested during the past five yearsAn intriguing introductory section explains why traditional security techniques are no longer adequate and which new methods will meet particular corporate and industry network needsDiscusses software that automatically applies security technologies when it recognizes suspicious activities, as opposed to people having to trigger the deployment of those same security technologies
Pages
720
Format
Hardcover
Publisher
Wiley
Release
June 01, 2007
ISBN
0471787566
ISBN 13
9780471787563

Department of Defense Information Security Report: The New Model for Protecting Networks Against Terrorist Threats

Cliff Wang
4.5/5 ( ratings)
After September 11th, the Department of Defense undertook a massive and classified research project to develop new security methods using technology in order to protect secret information from terrorist attacksWritten in language accessible to a general technical reader, this book examines the best methods for testing the vulnerabilities of networks and software that have been proven and tested during the past five yearsAn intriguing introductory section explains why traditional security techniques are no longer adequate and which new methods will meet particular corporate and industry network needsDiscusses software that automatically applies security technologies when it recognizes suspicious activities, as opposed to people having to trigger the deployment of those same security technologies
Pages
720
Format
Hardcover
Publisher
Wiley
Release
June 01, 2007
ISBN
0471787566
ISBN 13
9780471787563

Rate this book!

Write a review?

loader