November 2017
Intermediate to advanced
494 pages
14h 29m
English
Key requirements are as follows:
This is a typical scenario for a public library network system. Since a public library is a public place with access to computers for public usage, it is very important to isolate sensitive networks. In this example, the network is isolated using two subnets: ...