This book provides a reference tool for the increasing number of scientists whose research is more or less involved in network security.

Coverage includes network design and modeling, network management, data management, security and applications.

Verwandte Artikel