Follow
( Publications: 25 | Followers: 0 )

Computer Security: Principles and Practice, 1/e

This must be configured appropriately, with suitable authentication and. encryption mechanisms used, particularly when using remote administration.

Publish on Category: All 9

0

Embed

Share

Upload

Computer Security: Principles and Practice, 1/e