Eduardo Huedo Cuesta
Your browser has limited support for third-party cookies, which may prevent you from viewing this content. If you run into problems, you can view the content in a
new window.
- Burns, B. (2007), Security power tools
- Cole, E. (2009), Network security bible
- Johnson, R. (2015), Security policies and implementation issues
- McClure, S. (2012), Hacking exposed 7 : network security secrets & solutions
- Stewart, J. M. (2014), Network security firewalls and VPNs
- Harris, S., Maymí, F. (2016), All in one CISSP, exam guide
- Stallings, W. (2017), Network security essentials : applications and standards
- Lee, R. (2013), Security basics for computer architects [Libro-e]
- Vacca, J. (2009), Computer and Information Security Handbook
- Vacca, J. (2009), Computer and Information Security Handbook [Libro-e]
Conozco y acepto que el uso de los materiales contenidos en estas guías se realiza con finalidad de estudio, de apoyo a la docencia y la investigación. Se respetarán las condiciones de uso y contratación de cada uno de los recursos.