Securing the virtual environment how to defend the enterprise against attack /
Salvato in:
| Autore principale: | |
|---|---|
| Ente Autore: | |
| Altri autori: | |
| Natura: | Elettronico eBook |
| Lingua: | inglese |
| Pubblicazione: |
Indianapolis, IN :
John Wiley & Sons,
c2012.
|
| Soggetti: | |
| Accesso online: | An electronic book accessible through the World Wide Web; click to view |
| Tags: |
Nessun Tag, puoi essere il primo ad aggiungerne!!
|
Documenti analoghi: Securing the virtual environment
- Proceedings of the 2009 International Conference on Computer and Network Technology, Chennai, India, 24-26 July 2009
- Content networking architecture, protocols, and practice /
- Selected papers from the 4th international network conference 2004 Plymouth UK
- Nagios Core administration cookbook develop an integrated monitoring solution for virtually any kind of network /
- Telecommunication Economics Selected Results of the COST Action ISO605 Econ@Tel /
- NGN architectures, protocols and services /