List of Tables


Chapter 1: The Internet and Security

Table 1.1: OSI
Table 1.2
Table 1.3: Protocol Implementation
Table 1.4
Table 1.5: Protocol Implementation

Chapter 3: Cryptography

Table 3.1

Chapter 9: What are we Doing Here?

Table 9.1
Table 9.2: Exposures
Table 9.3: Suggested Controls
Table 9.4: Required Controls
Table 9.5: Threat Examples (1)
Table 9.6: Threat Examples (2)
Table 9.7
Table 9.8: Cost of Impact Table
Table 9.9

Chapter 10: Disaster Recovery

Table 10.1



Internet Security(c) A Jumpstart for Systems Administrators and IT Managers
Internet Security: A Jumpstart for Systems Administrators and IT Managers
ISBN: 1555582982
EAN: 2147483647
Year: 2003
Pages: 103
Authors: Tim Speed, Juanita Ellis
BUY ON AMAZON

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net