Securing the virtual environment how to defend the enterprise against attack /
Bewaard in:
| Hoofdauteur: | |
|---|---|
| Coauteur: | |
| Andere auteurs: | |
| Formaat: | Elektronisch E-boek |
| Taal: | Engels |
| Gepubliceerd in: |
Indianapolis, IN :
John Wiley & Sons,
c2012.
|
| Onderwerpen: | |
| Online toegang: | An electronic book accessible through the World Wide Web; click to view |
| Tags: |
Geen labels, Wees de eerste die dit record labelt!
|
Gelijkaardige items: Securing the virtual environment
- Proceedings of the 2009 International Conference on Computer and Network Technology, Chennai, India, 24-26 July 2009
- Content networking architecture, protocols, and practice /
- Selected papers from the 4th international network conference 2004 Plymouth UK
- Nagios Core administration cookbook develop an integrated monitoring solution for virtually any kind of network /
- NGN architectures, protocols and services /
- Telecommunication Economics Selected Results of the COST Action ISO605 Econ@Tel /