• Out-of-Stock
Security of the TCP / IP protocol. A complete guide
search
  • Security of the TCP / IP protocol. A complete guide
ID: 48228
Libor Dostalek
Delivery date unknown
 

Free shipping

free shipping in Poland for all orders over 500 PLN

 

Same day shipping

If your payment will be credited to our account by 11:00

 

14 days for return

Each consumer can return the purchased goods within 14 days

Securing computer networks, especially against unwanted access from the Internet, is a problem whose importance is becoming increasingly aware of companies and institutions. Only a few years ago there were systems operating on the Internet with only the minimum level of security. The story of many of them? Topped? has been successful in carrying out? often very simple? attacks. Today we have a system of standards (protocols), the use of which allows to avoid the vast majority of attacks. Similarly as after the adoption of hygienic habits by the public, the number of infectious diseases significantly decreased, so thanks to the use of modern security protocols, the number of successful attacks from the Internet is clearly decreasing.

Prudent organizations no longer leave the security of web servers, corporate data and applications, maintaining the privacy of electronic communications and the maximum protection of commercial transactions on the Internet to the default settings of their systems. They take care of their proper configuration, install additional security programs or introduce their own secured applications. The electronic signature is also used to protect electronic communication.

Anyone who desires to understand the principles on which computer security is based and their implementation in practice, we come across a publication that in one volume describes in detail all the useful technologies. The network administrators will be able to understand the causes and ways of implementing the activities necessary for their organization. The developers-programmers will serve as a unique source for writing programs that use security technologies.
48228

Other products in the same category (16)