November 2016
Intermediate to advanced
840 pages
18h 57m
English
The demand for comprehensive network security has never been greater. Malicious users remain a threat; they steal, manipulate, and impede information, and they interrupt network services. Numerous solutions are available to address a network’s perimeter defense at the boundaries, but the greatest threat of information theft and unauthorized access remains within the internal network at the access level.
Organizations rely on networks to efficiently and securely manage who and what can access the network, and when, where, and how network access can occur. As threats of network service disruption by unauthorized access become more numerous, network reliability and security become more critical at each layer within ...