New methods of breaking into corporate networks are resulting in major losses. This book provides the information on how to guard against attacks and informs the IT manager of the products that can detect and prevent break-ins. It also explains concepts such as authentication and encryption.[...]
Most engineers rely on a small core of books that are specifically targeted to their job responsibilities. These dog-eared volumes are used daily and considered essential. But budgets and space commonly limit how many books can be added to your core library. This work intends to solve this problem. [...]