FoxPro 2.5 Programmers Reference(Win|DOS),Hawkins 1565292103€ 18,00
Network Security How to Plan for It & Achieve It 0070051410
300sinds 11 feb. '25, 07:10
€ 32,00
Ophalen of Verzenden
Verzenden voor € 4,78
Kenmerken
Beschrijving
||boek: Network Security How to Plan for It and Achieve It|Richard H. Baker|McGraw-Hill
||taal: en
||jaar: 1995
||druk: ?
||pag.: 456p
||opm.: softcover|like new
||isbn: 0-07-005141-0
||code: 1:002669
--- Over het boek (foto 1): Network Security How to Plan for It and Achieve It ---
Best Ways To Protect You LAN! What's the fastest, easiest way to master all the new tools and techniques you need to maintain network security, reliability, and integrity? Richard Baker's Network Security! Inside you'll find low-cost, workable solutions for keeping your company's vital data and equipment safe from hackers, viruses, power failures, industrial spies, logic bombs, and a host of other new security threats. You'll learn to: build a security plan; assess risks; control physical access; build security procedures; master hardware and software security; overcome the perils of passwords; secure any desktop; protect and manage local area and enterprise networks; stay abreast of E-mail security/privacy issues and other legal problems; and much more.
[source: https--www.amazon.com]
||taal: en
||jaar: 1995
||druk: ?
||pag.: 456p
||opm.: softcover|like new
||isbn: 0-07-005141-0
||code: 1:002669
--- Over het boek (foto 1): Network Security How to Plan for It and Achieve It ---
Best Ways To Protect You LAN! What's the fastest, easiest way to master all the new tools and techniques you need to maintain network security, reliability, and integrity? Richard Baker's Network Security! Inside you'll find low-cost, workable solutions for keeping your company's vital data and equipment safe from hackers, viruses, power failures, industrial spies, logic bombs, and a host of other new security threats. You'll learn to: build a security plan; assess risks; control physical access; build security procedures; master hardware and software security; overcome the perils of passwords; secure any desktop; protect and manage local area and enterprise networks; stay abreast of E-mail security/privacy issues and other legal problems; and much more.
[source: https--www.amazon.com]
Zoekertjesnummer: m2233914639
Populaire zoektermen
toegepaste informaticacomputer kortrijkinformaticaInformatica en Computertoegepaste informaticaoude computertime to momo in Reisgidsenfor girls only tijdschriften in Tijdschriften en Krantenway to play in Taal | Engelsit ends with us in Taal | Engelstime to momo in Reisgidsentime to act in Taal | Engelsit runner in Taal | Engelsphysics for scientists in Taal | Engelsbaby hekje in Traphekjescanon m50 in Fotocamera's Digitaalrotan stoel in Kinderkamer | Tafels en Stoelentractor binnenband in Landbouw | Onderdelen | Banden, Velgen en Assenschade autos toyota in Toyotacurver tuinstoelen in Tuinstoelentrekhaak zitmaaier in Zitmaaiersgoogle chromecast 3 in Mediaspelersachterklep e46 in Carrosserieporsche 964 in Modelauto's | 1:18