Defensive Wireless Network Security Strategies for Governments and Industry Groups


Wireless Network Armed Force National Security Malicious Code Strategic Level 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

11. References

  1. [1]
    John R. Vacca, Electronic Commerce, Fourth Edition, Charles River Media, 2003.Google Scholar
  2. [2]
    John R. Vacca, Net Privacy: A Guide to Developing & Implementing an Ironclad ebusiness Privacy Plan, McGraw-Hill, 2001.Google Scholar
  3. [3]
    John R. Vacca, High-Speed Cisco Networks: Planning, Design, and Implementation. CRC Press, 2002.Google Scholar
  4. [4]
    John R. Vacca, The Cabling Handbook (2ndEdition), Prentice Hall, 2001.Google Scholar
  5. [5]
    John R. Vacca, The Essential Guide to Storage Area Networks, Prentice Hall, 2002.Google Scholar
  6. [6]
    John R. Vacca, Firewalls: Jumpstart For Network And Systems Administrators, Elsevier Digital Press (December, 2004).Google Scholar
  7. [7]
    John R. Vacca, Computer Forensics: Computer Crime Scene Investigation. 2nd Edition, Charles River Media, 2005.Google Scholar

Copyright information

© Springer Science+Business Media, LLC 2006

Personalised recommendations