A practical introduction to defending modern networks Drawing on decades of experience, Chuck Easttom brings together updated coverage of all the conc...
Learn to recognise hackers’ tracks and uncover network-based evidence in Network Forensics: Tracking Hackers through Cyberspace. Carve suspicious emai...
Network Functions Virtualization (NFV) with a Touch of SDN is the first practical introduction to NFV’s fundamental concepts, techniques, and use case...
Today, networks must evolve and scale faster than ever. You can’t manage everything by hand anymore: You need to automate relentlessly. YANG, along wi...
The classic guide to cryptography and network security – now fully updated! “Alice and Bob are back!” Widely regarded as the most comprehensive yet co...
Today, every business relies on the Internet - and, therefore, every business requires strong network security. Network Security First-Step, Second E...
Network Security Technologies and Solutions is a comprehensive reference to the most cutting-edge security products and methodologies available to net...