ABSTRACT
Unlike data communications of the past, today's networks consist of numerous devices that handle the data as it passes from the sender to the receiver. However, security concerns are frequently raised in circumstances where interconnected computers use a network not controlled by any one entity or organization. Introduction to Network Security exam
TABLE OF CONTENTS
part |2 pages
Part I Introduction to Network Concepts and Threats
part |2 pages
Part II Lower-Layer Security
part |2 pages
Part III: Application Layer Security
part |2 pages
Part IV Network-Based Mitigation