Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Alfred C. Weaver and Michael W. Condry. “Distributing Internet Services to the Network’s Edge,” IEEE Transactions In Industrial Electronics, © Copyright 2003, IEEE, IEEE Corporate Office, 3 Park Avenue, 17th Floor, New York, New York, 10016-5997 U.S.A., Vol. 50, No. 3, pp. 80–85, June, 2003.
Tom Syroid. ‘Web Server Security,” © Copyright 2002, IBM Corporation, 1133 Westchester Avenue White Plains, New York 10604 United States, September 1, 2002.
“HyperText Transfer Protocol,” Copyright 2006 Jupitermedia Corporation All Rights Reserved. Jupitermedia Headquarters, 23 Old Kings Highway South, Darien, CT 06820, 2006.
“Marimba Desktop/Mobile Change Management Security Concepts,” Copyright © 2003 Marimba, Inc. All Right Reserved. Marimba Inc., 440 Clyde Ave., Mountain View, CA. 94043, 2003.
John R. Vacca, Guide to Wireless Network Security, Springer, 2006.
John R. Vacca, Net Privacy: A Guide to Developing and Implementing an Ironclad ebusiness Privacy Plan, McGraw-Hill, 2001.
John R. Vacca, Public Key Infrastructure: Building Trusted Applications and Web Servicess, Auerbach Publications, 2004.
John R. Vacca, Firewalls: Jumpstart for Network and Systems Administrators, Digital Press, 2004.
Rights and permissions
Copyright information
© 2007 Springer Science+Business Media, LLC
About this chapter
Cite this chapter
(2007). Internet Technologies. In: Practical Internet Security. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-29844-3_1
Download citation
DOI: https://doi.org/10.1007/978-0-387-29844-3_1
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-40533-9
Online ISBN: 978-0-387-29844-3
eBook Packages: Computer ScienceComputer Science (R0)