[go: up one dir, main page]

Piliouras, 2004 - Google Patents

Network design: management and technical perspectives

Piliouras, 2004

Document ID
2935592307863015372
Author
Piliouras T
Publication year

External Links

Snippet

There are hundreds of technologies and protocols used in telecommunications. They run the full gamut from application level to physical level. It is overwhelming to try to keep track of them. Network Design, Second Edition: Management and Technical Perspectives is a broad …
Continue reading at www.taylorfrancis.com (other versions)

Similar Documents

Publication Publication Date Title
Kaur et al. Understanding cybersecurity management in FinTech
Piliouras Network design: management and technical perspectives
Anderson Why information security is hard-an economic perspective
Tipton et al. Information security management handbook
Terplan et al. The telecommunications handbook
Jacobs Engineering information security: The application of systems engineering concepts to achieve information assurance
Onwubiko et al. Challenges towards building an effective cyber security operations centre
Purser A practical guide to managing information security
GB2628919A (en) Systems and methods for synchronizing and protecting data
Glaessner et al. Electronic Security: Risk Mitigation in Financial Transactions: Public Policy Issues
Almogbil Security, perceptions, and practices: Challenges facing adoption of online banking in Saudi Arabia
Muniz The modern security operations center
Allen et al. Outsourcing managed security services
US7818200B2 (en) Method and system for providing a trust-based reputation service for virtual organization formation
Hiles et al. E-Business Service Level Agreements: Strategies for Service Providers, E-Commerce and Outsourcing
Jackson Network security auditing
Gupta et al. Security analysis of Internet technology components enabling globally distributed workplaces—a framework
May et al. Defense in depth: foundation for secure and resilient it enterprises
Piliouras Network design
Brewer Security Controls For Sarbanes-Oxley Section 404-I
Bhushan et al. Fundamental of Cyber Security
Jordan Cyber infrastructure protection
Chowdhary Financial Network Infrastructure: Scalability, Security and Optimization
Al-Azazi A multi-layer model for e-government information security assessment
Oriot et al. Omnichannel Cybersecurity: Optimizing Security by Leveraging Asymmetric Motivation