Lex

Browse

GenresShelvesPremiumBlog

Company

AboutJobsPartnersSell on LexAffiliates

Resources

DocsInvite FriendsFAQ

Legal

Terms of ServicePrivacy Policygeneral@lex-books.com(215) 703-8277

© 2026 LexBooks, Inc. All rights reserved.

Network security evaluation using the NSA IEMNetwork security evaluation using the NSA IEM

Network security evaluation using the NSA IEM

Ed Fuller, Bryan Cunningham, Ted Dykstra, Russ Rogers, Greg Miles, Matthew Hoagberg, Chuck Little, Travis Schack

Details

OL Work ID
OL19554333W

Subjects

Computer networksEvaluationSecurity measuresComputer securityInformation resources managementComputer networks, security measuresRéseaux d'ordinateursSécuritéMesuresSécurité informatique

Find this book

Open Library
Book data from Open Library. Cover images courtesy of Open Library.