Gør som tusindvis af andre bogelskere
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.Du kan altid afmelde dig igen.
Suitable for IT professionals managing enterprise security, this book allows readers to assess vulnerabilities, design protection schemes and plan for disaster recovery should an attack occur. It includes topics such as: Botnets, Cross Site Scripting Attacks, Social Engineering, Physical and Logical Convergence and Payment Card Industry (PCI).
Features the real world cases of botnet attacks to underscore the need for action. This title explains botnet fundamentals using real world examples. It covers what they are, how they operate, and the environment and technology that makes them possible. It analyzes botnets for opportunities to detect, track, and remove them.
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.