Practical internet security:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
New York, NY
Springer
2007
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis Klappentext |
Beschreibung: | Literaturangaben |
Beschreibung: | XXI, 536 S. Ill., graph. Darst. |
ISBN: | 9780387405339 038740533X |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV020849433 | ||
003 | DE-604 | ||
005 | 20071025 | ||
007 | t | ||
008 | 051028s2007 ad|| |||| 00||| eng d | ||
020 | |a 9780387405339 |9 978-0-387-40533-9 | ||
020 | |a 038740533X |9 0-387-40533-X | ||
035 | |a (OCoLC)62532615 | ||
035 | |a (DE-599)BVBBV020849433 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
049 | |a DE-355 |a DE-91G |a DE-573 | ||
050 | 0 | |a TK5105.59 | |
082 | 0 | |a 005.8 |2 22 | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
084 | |a DAT 461f |2 stub | ||
100 | 1 | |a Vacca, John R. |d 1947- |e Verfasser |0 (DE-588)115294341 |4 aut | |
245 | 1 | 0 | |a Practical internet security |c by John R. Vacca |
264 | 1 | |a New York, NY |b Springer |c 2007 | |
300 | |a XXI, 536 S. |b Ill., graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Literaturangaben | ||
650 | 4 | |a Internet - Sécurité - Mesures | |
650 | 4 | |a Réseaux d'ordinateurs - Sécurité - Mesures | |
650 | 4 | |a Computer networks |x Security measures | |
650 | 4 | |a Internet |x Security measures | |
650 | 0 | 7 | |a Internet |0 (DE-588)4308416-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Internet |0 (DE-588)4308416-3 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
856 | 4 | 2 | |m Digitalisierung UB Regensburg |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=014171166&sequence=000003&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Digitalisierung UB Regensburg |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=014171166&sequence=000004&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Klappentext |
999 | |a oai:aleph.bib-bvb.de:BVB01-014171166 |
Datensatz im Suchindex
_version_ | 1804134562097266688 |
---|---|
adam_text | internet
As organizers increase their systems links across enterprise-wide
networks and VPNs, as well as their exposure to customers,
competitors, browsers, and hackers, it becomes increasingly
imperative for Web professionals to be trained in techniques for
effectively protecting their sites from internal and external threats.
Practical Internet security, a professional book, reveals how the
internet is paving the way for secure communications within
organizations and on the public internet. This volume provides the
fundamental knowledge needed to analyze risks to a system and to
implement a security policy that protects information assets from
potential intrusion, damage, or theft. This volume provides dozens of
real-life scenarios and examples, as well as hands-on instruction in
securing web communications and sites.
All systems administrators and tT security managers will find Practical
Internet Security an essential practical resource. This book is also
suitable for graduate-level students in computer science.
John R.
internationally known best selling author. Since
authored
networking, telecommunications, advanced storage, computer
security and aerospace technology). John was a configuration
management specialist, computer specialist, and the computer
security official (CSO) for NASA s space station program (Freedom) and
the International space station Program from
retirement from NASA in
independent online reviewer of books for Barnes and Noble and
Amazon. John was also one of the security consultants for the MGM
movie titled:
Contents
Dedication
Acknowledgements
Foreword
Preface
PART I: INTRODUCTION TO INTERNET SECURITY
Chapter
Chapter
PART II: ESTABLISHING YOUR ORGANIZATION
Chapter
Chapter
PART III: DEVELOPING YOUR SECURITY POLICY
Chapter
Chapter
PART IV: SECURING THE WEB CLIENT
Chapter
Chapter
PART V: NETWORK INTERCONNECTIONS:
OF VULNERABILITY
Chapter
Chapter
v
xi
xiii
XV
1
3
27
37
39
47
57
59
77
143
145
177
183
185
193
viii Contents
PART VI: DETERRING MASQUERADERS AND ENSURING AUTHENTICITY
Chapter
Chapter
Chapter
PART
Chapter
Chapter
That s The Question?
PART
INTEGRITY
Chapter
Chapter
PART IX: AVOIDING DISRUPTION OF SERVICE TO MAINTAIN
AVAILABILITY
Chapter
Chapter
Chapter
PART X: CONFIGURING OPERATING SYSTEM AND NETWORK
SECURITY
Chapter
Chapter
PART XI: ENHANCING WEB SERVER SECURITY
Chapter
Chapter
Chapter
PART
Chapter
Chapter
Chapter
Contents ix
PART
Chapter
Chapter
Chapter
Chapter
PART
DIRECTIONS
Chapter
Chapter
Chapter
Chapter
Chapter
Chapter
PART XV: APPENDICES
Appendix A: Configuring Internet Authentication Service On Microsoft Windows
2003
Appendix
Appendix C: List Of Top Internet Security Implementation And Deployment
Companies
Appendix D: List Of Internet Security Products
Appendix E: List Of Internet Security Standards
Appendix F: List Of Miscellaneous Internet Security Resources
Appendix G: Glossary
Index
|
adam_txt |
internet
As organizers increase their systems links across enterprise-wide
networks and VPNs, as well as their exposure to customers,
competitors, browsers, and hackers, it becomes increasingly
imperative for Web professionals to be trained in techniques for
effectively protecting their sites from internal and external threats.
Practical Internet security, a professional book, reveals how the
internet is paving the way for secure communications within
organizations and on the public internet. This volume provides the
fundamental knowledge needed to analyze risks to a system and to
implement a security policy that protects information assets from
potential intrusion, damage, or theft. This volume provides dozens of
real-life scenarios and examples, as well as hands-on instruction in
securing web communications and sites.
All systems administrators and tT security managers will find Practical
Internet Security an essential practical resource. This book is also
suitable for graduate-level students in computer science.
John R.
internationally known best selling author. Since
authored
networking, telecommunications, advanced storage, computer
security and aerospace technology). John was a configuration
management specialist, computer specialist, and the computer
security official (CSO) for NASA's space station program (Freedom) and
the International space station Program from
retirement from NASA in
independent online reviewer of books for Barnes and Noble and
Amazon. John was also one of the security consultants for the MGM
movie titled:
Contents
Dedication
Acknowledgements
Foreword
Preface
PART I: INTRODUCTION TO INTERNET SECURITY
Chapter
Chapter
PART II: ESTABLISHING YOUR ORGANIZATION'
Chapter
Chapter
PART III: DEVELOPING YOUR SECURITY POLICY
Chapter
Chapter
PART IV: SECURING THE WEB CLIENT
Chapter
Chapter
PART V: NETWORK INTERCONNECTIONS:
OF VULNERABILITY
Chapter
Chapter
v
xi
xiii
XV
1
3
27
37
39
47
57
59
77
143
145
177
183
185
193
viii Contents
PART VI: DETERRING MASQUERADERS AND ENSURING AUTHENTICITY
Chapter
Chapter
Chapter
PART
Chapter
Chapter
That's The Question?
PART
INTEGRITY
Chapter
Chapter
PART IX: AVOIDING DISRUPTION OF SERVICE TO MAINTAIN
AVAILABILITY
Chapter
Chapter
Chapter
PART X: CONFIGURING OPERATING SYSTEM AND NETWORK
SECURITY
Chapter
Chapter
PART XI: ENHANCING WEB SERVER SECURITY
Chapter
Chapter
Chapter
PART
Chapter
Chapter
Chapter
Contents ix
PART
Chapter
Chapter
Chapter
Chapter
PART
DIRECTIONS
Chapter
Chapter
Chapter
Chapter
Chapter
Chapter
PART XV: APPENDICES
Appendix A: Configuring Internet Authentication Service On Microsoft Windows
2003
Appendix
Appendix C: List Of Top Internet Security Implementation And Deployment
Companies
Appendix D: List Of Internet Security Products
Appendix E: List Of Internet Security Standards
Appendix F: List Of Miscellaneous Internet Security Resources
Appendix G: Glossary
Index |
any_adam_object | 1 |
any_adam_object_boolean | 1 |
author | Vacca, John R. 1947- |
author_GND | (DE-588)115294341 |
author_facet | Vacca, John R. 1947- |
author_role | aut |
author_sort | Vacca, John R. 1947- |
author_variant | j r v jr jrv |
building | Verbundindex |
bvnumber | BV020849433 |
callnumber-first | T - Technology |
callnumber-label | TK5105 |
callnumber-raw | TK5105.59 |
callnumber-search | TK5105.59 |
callnumber-sort | TK 45105.59 |
callnumber-subject | TK - Electrical and Nuclear Engineering |
classification_rvk | ST 276 ST 277 |
classification_tum | DAT 461f |
ctrlnum | (OCoLC)62532615 (DE-599)BVBBV020849433 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01967nam a2200469 c 4500</leader><controlfield tag="001">BV020849433</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20071025 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">051028s2007 ad|| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780387405339</subfield><subfield code="9">978-0-387-40533-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">038740533X</subfield><subfield code="9">0-387-40533-X</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)62532615</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV020849433</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-355</subfield><subfield code="a">DE-91G</subfield><subfield code="a">DE-573</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">TK5105.59</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 461f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Vacca, John R.</subfield><subfield code="d">1947-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)115294341</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Practical internet security</subfield><subfield code="c">by John R. Vacca</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York, NY</subfield><subfield code="b">Springer</subfield><subfield code="c">2007</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XXI, 536 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Literaturangaben</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet - Sécurité - Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs - Sécurité - Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Regensburg</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=014171166&sequence=000003&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Regensburg</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=014171166&sequence=000004&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Klappentext</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-014171166</subfield></datafield></record></collection> |
id | DE-604.BV020849433 |
illustrated | Illustrated |
index_date | 2024-07-02T13:19:22Z |
indexdate | 2024-07-09T20:26:35Z |
institution | BVB |
isbn | 9780387405339 038740533X |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-014171166 |
oclc_num | 62532615 |
open_access_boolean | |
owner | DE-355 DE-BY-UBR DE-91G DE-BY-TUM DE-573 |
owner_facet | DE-355 DE-BY-UBR DE-91G DE-BY-TUM DE-573 |
physical | XXI, 536 S. Ill., graph. Darst. |
publishDate | 2007 |
publishDateSearch | 2007 |
publishDateSort | 2007 |
publisher | Springer |
record_format | marc |
spelling | Vacca, John R. 1947- Verfasser (DE-588)115294341 aut Practical internet security by John R. Vacca New York, NY Springer 2007 XXI, 536 S. Ill., graph. Darst. txt rdacontent n rdamedia nc rdacarrier Literaturangaben Internet - Sécurité - Mesures Réseaux d'ordinateurs - Sécurité - Mesures Computer networks Security measures Internet Security measures Internet (DE-588)4308416-3 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Internet (DE-588)4308416-3 s Computersicherheit (DE-588)4274324-2 s DE-604 Digitalisierung UB Regensburg application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=014171166&sequence=000003&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis Digitalisierung UB Regensburg application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=014171166&sequence=000004&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA Klappentext |
spellingShingle | Vacca, John R. 1947- Practical internet security Internet - Sécurité - Mesures Réseaux d'ordinateurs - Sécurité - Mesures Computer networks Security measures Internet Security measures Internet (DE-588)4308416-3 gnd Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)4308416-3 (DE-588)4274324-2 |
title | Practical internet security |
title_auth | Practical internet security |
title_exact_search | Practical internet security |
title_exact_search_txtP | Practical internet security |
title_full | Practical internet security by John R. Vacca |
title_fullStr | Practical internet security by John R. Vacca |
title_full_unstemmed | Practical internet security by John R. Vacca |
title_short | Practical internet security |
title_sort | practical internet security |
topic | Internet - Sécurité - Mesures Réseaux d'ordinateurs - Sécurité - Mesures Computer networks Security measures Internet Security measures Internet (DE-588)4308416-3 gnd Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Internet - Sécurité - Mesures Réseaux d'ordinateurs - Sécurité - Mesures Computer networks Security measures Internet Security measures Internet Computersicherheit |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=014171166&sequence=000003&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=014171166&sequence=000004&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT vaccajohnr practicalinternetsecurity |