Related Articles
Search Results
Advertisement
Presents the tasks and commands for securing networks with Cisco routers, and for performing a security audit. The author identifies common security risks, and explains how to mitigate those risks, primarily on
This extensive library of computer programs-written in C language-allows readers to solve numerical problems in areas of linear algebra, ordinary and partial differential equations, optimization, parameter estimation, and special functions of mathematical
Intellectual property owners who exploit new ways of reproducing, distributing, and marketing their creations digitally must also protect them from piracy. Multimedia Security Handbook addresses multiple issues related to the protection of