Piliouras, 2004 - Google Patents
Network design: management and technical perspectivesPiliouras, 2004
- Document ID
- 2935592307863015372
- Author
- Piliouras T
- Publication year
External Links
Snippet
There are hundreds of technologies and protocols used in telecommunications. They run the full gamut from application level to physical level. It is overwhelming to try to keep track of them. Network Design, Second Edition: Management and Technical Perspectives is a broad …
- 238000005516 engineering process 0 description 116
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Kaur et al. | Understanding cybersecurity management in FinTech | |
| Piliouras | Network design: management and technical perspectives | |
| Anderson | Why information security is hard-an economic perspective | |
| Tipton et al. | Information security management handbook | |
| Terplan et al. | The telecommunications handbook | |
| Jacobs | Engineering information security: The application of systems engineering concepts to achieve information assurance | |
| Onwubiko et al. | Challenges towards building an effective cyber security operations centre | |
| Purser | A practical guide to managing information security | |
| GB2628919A (en) | Systems and methods for synchronizing and protecting data | |
| Glaessner et al. | Electronic Security: Risk Mitigation in Financial Transactions: Public Policy Issues | |
| Almogbil | Security, perceptions, and practices: Challenges facing adoption of online banking in Saudi Arabia | |
| Muniz | The modern security operations center | |
| Allen et al. | Outsourcing managed security services | |
| US7818200B2 (en) | Method and system for providing a trust-based reputation service for virtual organization formation | |
| Hiles et al. | E-Business Service Level Agreements: Strategies for Service Providers, E-Commerce and Outsourcing | |
| Jackson | Network security auditing | |
| Gupta et al. | Security analysis of Internet technology components enabling globally distributed workplaces—a framework | |
| May et al. | Defense in depth: foundation for secure and resilient it enterprises | |
| Piliouras | Network design | |
| Brewer | Security Controls For Sarbanes-Oxley Section 404-I | |
| Bhushan et al. | Fundamental of Cyber Security | |
| Jordan | Cyber infrastructure protection | |
| Chowdhary | Financial Network Infrastructure: Scalability, Security and Optimization | |
| Al-Azazi | A multi-layer model for e-government information security assessment | |
| Oriot et al. | Omnichannel Cybersecurity: Optimizing Security by Leveraging Asymmetric Motivation |