January 2012
Intermediate to advanced
848 pages
37h 36m
English
S.K. Ghosh, Ehab Al-Shaer and P. Bera
Today, most of the enterprise networks deploy policy-based security configurations due to extensive use of various network services and pervasive computing applications for accessing network resources. However, most of the enterprise networks face security threats because of improper security policy and its incorrect implementations. Typically, an enterprise network consists of a set of network zones corresponding to different units/sections of the organization. These network zones are interconnected through various access routers (Layer 3 routers). The overall organizational security policies of such ...
Read now
Unlock full access