Abstract
This chapter will discuss:
-
The role of an organization’s network administrator from the perspective of managing user access,
-
High-level issues influencing how a network administrator ensures security, and
-
How network administration fits into the organization’s business processes.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
Rights and permissions
Copyright information
© 2007 Springer Science+Business Media, LLC
About this chapter
Cite this chapter
(2007). Network Administration. In: Network Security Policies and Procedures. Advances in Information Security, vol 32. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-47955-2_14
Download citation
DOI: https://doi.org/10.1007/978-0-387-47955-2_14
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-30937-8
Online ISBN: 978-0-387-47955-2
eBook Packages: Computer ScienceComputer Science (R0)
