- Home
- Computers
- Networking
- Secure Computers and Networks (Analysis, Design, and Implementation)
Secure Computers and Networks (Analysis, Design, and Implementation)
List Price:
$54.99
- Availability: Confirm prior to ordering
- Branding: minimum 50 pieces (add’l costs below)
- Check Freight Rates (branded products only)
Branding Options (v), Availability & Lead Times
- 1-Color Imprint: $2.00 ea.
- Promo-Page Insert: $2.50 ea. (full-color printed, single-sided page)
- Belly-Band Wrap: $2.50 ea. (full-color printed)
- Set-Up Charge: $45 per decoration
- Availability: Product availability changes daily, so please confirm your quantity is available prior to placing an order.
- Branded Products: allow 10 business days from proof approval for production. Branding options may be limited or unavailable based on product design or cover artwork.
- Unbranded Products: allow 3-5 business days for shipping. All Unbranded items receive FREE ground shipping in the US. Inquire for international shipping.
- RETURNS/CANCELLATIONS: All orders, branded or unbranded, are NON-CANCELLABLE and NON-RETURNABLE once a purchase order has been received.
Product Details
Author:
Eric A. Fisch, Gregory B. White
Format:
Hardcover
Pages:
366
Publisher:
CRC Press (December 28, 1999)
Language:
English
Audience:
Professional and scholarly
ISBN-13:
9780849318689
ISBN-10:
0849318688
Weight:
31.5oz
Dimensions:
7" x 10"
File:
TAYLORFRANCIS-TayFran_260403050835162-20260403.xml
Folder:
TAYLORFRANCIS
List Price:
$54.99
Country of Origin:
United States
Case Pack:
18
As low as:
$52.24
Publisher Identifier:
P-CRC
Discount Code:
H
Pub Discount:
30
Imprint:
CRC Press
Overview
This guide presents expert information on analyzing, designing, and implementing all aspects of computer network security. Based on the authors' research and practical experience, Secure Computers and Networks enables CIOs, MIS/DP managers, systems and applications programmers, and a variety of network specialists to maintain and protect increasingly complex network configurations. The book outlines the basic, most practical measures they need to take to protect their systems from invasion by all but the most talented, persistent hackers. It thoroughly covers cryptography and includes numerous case studies and bibliographic references.








