Remember the first time someone told you about the OSI model and described the various layers? It's probably something you never forgot. This book takes that same layered approach but applies it to network security in a new and refreshing way. It guides readers step-by-step through the stack starting with physical security and working its way up through each of the seven OSI layers. Each chapter focuses on one layer of the stack along with the attacks, vulnerabilities, and exploits that can be found at that layer. The book even includes a chapter on the mythical eighth layer. It's called the people layer. It's included because security is not just about technology it also requires interaction with people, policy and office politics.
基于OSI7层模型,增补了用户层的做法很有创意,全书也是以这8层作为章节划分。
评分基于OSI7层模型,增补了用户层的做法很有创意,全书也是以这8层作为章节划分。
评分基于OSI7层模型,增补了用户层的做法很有创意,全书也是以这8层作为章节划分。
评分基于OSI7层模型,增补了用户层的做法很有创意,全书也是以这8层作为章节划分。
评分基于OSI7层模型,增补了用户层的做法很有创意,全书也是以这8层作为章节划分。
本站所有内容均为互联网搜索引擎提供的公开搜索信息,本站不存储任何数据与内容,任何内容与数据均与本站无关,如有需要请联系相关搜索引擎包括但不限于百度,google,bing,sogou 等
© 2025 onlinetoolsland.com All Rights Reserved. 本本书屋 版权所有