Business data networks and security:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Boston [u.a.]
Pearson
2013
|
Ausgabe: | 9. ed., internat. ed. |
Schriftenreihe: | Always learning
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | Includes index |
Beschreibung: | XXIV, 500 S. Ill. |
ISBN: | 9780133080452 0133080455 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV041362219 | ||
003 | DE-604 | ||
005 | 20131023 | ||
007 | t | ||
008 | 131016s2013 a||| |||| 00||| eng d | ||
020 | |a 9780133080452 |9 978-0-13-308045-2 | ||
020 | |a 0133080455 |9 0-13-308045-5 | ||
035 | |a (OCoLC)862824122 | ||
035 | |a (DE-599)BVBBV041362219 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
049 | |a DE-92 | ||
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
100 | 1 | |a Panko, Raymond R. |e Verfasser |0 (DE-588)1041697783 |4 aut | |
245 | 1 | 0 | |a Business data networks and security |c Raymond R. Panko ; Julia L. Panko |
250 | |a 9. ed., internat. ed. | ||
264 | 1 | |a Boston [u.a.] |b Pearson |c 2013 | |
300 | |a XXIV, 500 S. |b Ill. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 0 | |a Always learning | |
500 | |a Includes index | ||
650 | 4 | |a Business enterprises / Computer networks / Security measures | |
650 | 4 | |a Computer networks / Managment | |
650 | 4 | |a Computer networks / Security measures | |
650 | 4 | |a Computer security | |
650 | 7 | |a Unternehmen |2 gnd | |
650 | 7 | |a Rechnernetz |2 gnd | |
650 | 7 | |a Computersicherheit |2 gnd | |
650 | 4 | |a Unternehmen | |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 1 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
700 | 1 | |a Panko, Julia L. |e Sonstige |0 (DE-588)143697358 |4 oth | |
856 | 4 | 2 | |m HBZ Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026810543&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-026810543 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk |
Datensatz im Suchindex
_version_ | 1804151447159308288 |
---|---|
adam_text | Titel: Business data networks and security
Autor: Panko, Raymond R
Jahr: 2013
CONTENTS
Preface for Students xix
About the Authors xxii
Basic Concepts and Principles
Chapter 1 WELCOME TO THE CLOUD 1
In the Clouds 1
Jason Akana 1
Claire Lorek 4
John Lee 7
The Rogue Access Point 7
Networking and Security 7
Basic Network Terminology 8
Networks, Hosts, and Applications 8
Application Interactions 11
Speed 13
Packet Switching and the ARPANET 15
Larry Roberts Has a Burstiness Problem 15
Packet Switching Presents a Possible Solution 16
Physical Links and Data Links 19
Larry Roberts Builds a Solution 20
The Network Working Group 21
E-Mail 22
The Internet 23
Bob Kahn Has a Problem 23
Bob Kahn and Vint Cerf Find a Solution 23
A Second Layer of Networking 24
The Internet Evolves 29
The TCP/IP Standards 29
The Internet Is Born-Slowly 31
The Internet Goes Commercial 31
Supervisory Applications 32
A Small Home Network 35
Components 35
The Wireless Access Router 36
Services 37
Configuration 38
How This Book Is Organized 39
Conclusion 40
Synopsis 40
End-of-Chapter Questions 42
Chapter 1a HANDS-ON: WINDOWS NETWORKING 43
Hands-On Networking Tools 43
Binary and Decimal Conversions Using the
Microsoft Windows Calculator 43
Test Your Download Speed 44
Working with the Windows Command Line 44
Ping and Tracert 45
Nslookup 46
RFCs 46
Chapter 2 NETWORK STANDARDS 47
Introduction 47
Standard = Protocol 47
Network Standards 47
Recap of Chapter 1 Standards Concepts 48
Network Standard Characteristics 51
Examples of Message Ordering 53
Message Ordering in HTTP 53
Message Ordering and Reliability in TCP at the Transport Layer 53
Examples of Message Syn tax 57
Syntax: General Message Organization 57
The Ethernet Frame Syntax 59
The Internet Protocol (IP) Packet Syntax 60
Transmission Control Protocol (TCP) Segment Syntax 61
User Datagram Protocol (UDP) Datagram Syntax 63
Port Numbers 63
HTTP Request and Response Message Syntax 65
Converting Application Messages into Bits 68
Encoding 68
Encoding Text as ASCII 68
Whole Binary Numbers 69
Encoding Alternatives 70
Encoding Voice 71
Vertical Communication on Hosts 72
Major Standards Architectures 74
Architectures 74
The OSI Network Standards Architecture 76
The TCP/IP Network Standards Architecture 78
The Application Layer 79
TCP/IP and OSI: The Hybrid TCP/IP-OSI Standards Architecture 80
Higher Layers in OSI 80
Conclusion 82
Synopsis 82
End-of-Chapter Questions 83
Chapter 2a HANDS-ON: WIRESHARK PACKET CAPTURE 85
Introduction 85
Getting Wireshark 85
Using Wireshark 85
Getting Started 85
Starting a Packet Capture 86
Getting Data 86
Stopping Data Collection 86
Looking at Individual Packets 88
Options 89
Exercises 90
Chapter 3 NETWORK SECURITY 91
Steuben Arc 91
Introduction 92
Types of Attacks 93
Malware Attacks 95
Attacks on Individuals 99
Human Break-Ins (Hacking) 101
Denial-of-Service (DoS) Attacks Using Bots 104
Types of Attackers 105
Traditional Attackers 106
Criminal Attackers 107
Cyberterrorists and National Governments 107
Planning 108
Security Is a Management Issue 108
Planning Principles 108
Policy-Based Security 112
Authentication 115
Reusable Passwords 115
Other Forms of Authentication 118
Firewalls 122
Dropping and Logging Provable Attack Packets 122
Ingress and Egress Filtering 122
Static Packet Filtering 123
Stateful Firewall Filtering 124
Deep Inspection Firewalls 126
Protecting Dialogues Cryptography 128
Symmetric Key Encryption for Confidentiality 128
Electronic Signatures 129
Responding 130
Stages 130
Major Incidents and CSIRTs 132
Disasters and Business Continuity 132
Rehearsals 132
Conclusion 133
Synopsis 133
End-of-Chapter Questions 135
Chapter 4 NETWORK MANAGEMENT 139
Introduction 139
SDLC versus SLC 139
Cost 140
Strategic Network Planning 141
Network Quality of Service (QoS) 143
Transmission Speed 143
Rated Speed versus Throughput 146
Other Quality-of-Service Metrics 146
Service Level Agreements (SLAs) 149
Design 150
Traffic Analysis 150
Redundancy 152
Topology 153
Leased Line Network Topologies 155
Handling Momentary Traffic Peaks 157
Reducing Capacity Needs 159
Natural Designs 160
Evaluating Alternatives 161
Minimum Requirements 161
Product Selection with Multicriteria
Decision Making 163
Cost 165
Operational Management 167
OAM P 167
Network Management Software 168
Conclusion 169
Synopsis 169
End-of-Chapter Questions 170
Chapter 4a HANDS-ON: MICROSOFT OFFICE VISIO 171
What Is Visio? 171
Using Visio 171
Exercise 173
Applying Concepts and Principles: Up through the Layers
Chapter 5 WIRED ETHERNET LANs 175
Introduction 175
LANs and WANs 175
Ethernet 177
Ethernet Standards Development 179
Physical and Data Link Layer Operation 181
Ethernet Physical Layer Standards 181
Signaling 181
4-Pair Unshielded Twisted Pair Copper Wiring 184
Optical Fiber 188
Carrier Fiber 192
Link Aggregation (Bonding) 192
Ethernet Physical Layer Standards and Network Design 193
The Ethernet Frame 195
The Ethernet Frame s Organization 195
Preamble and Start of Frame Delimiter Fields 195
Source and Destination Address Fields 196
Tag Fields 196
Length Field 197
The Data Field 197
PAD Field 198
Frame Check Sequence Field 198
Basic Ethernet Data Link Layer Switch Operation 199
Frame Forwarding 199
Hierarchical Switch Topology 200
Advanced Ethernet Switch Operation 202
The Rapid Spanning Tree Protocol (RSTP) 202
Virtual LANs and Ethernet Switches 204
Priority 206
Manageability 207
Power over Ethernet (POE) 208
Ethernet Security 209
Port-Based Access Control (802.1X) 210
Security Standards Come from the 802.1 Working Group 211
802.3ba: 40 Gbps and 100 Gbps Ethernet 217
Conclusion 212
Synopsis 212
End-of-Chapter Questions 214
Chapter 5a HANDS-ON: CUTTING AND CONNECTORIZING UTP 215
Introduction 215
Solid and Stranded Wiring 215
Solid-Wire UTP versus Stranded-Wire UTP 215
Relative Advantages 215
Adding Connectors 215
Cutting the Cord 215
Stripping the Cord 216
Working with the Exposed Pairs 216
Pair Colors 216
Untwisting the Pairs 216
Ordering the Pairs 216
Cutting the Wires 217
Adding the Connector 218
Holding the Connector 218
Sliding in the Wires 218
Some Jacket Inside the Connector 218
Crimping 219
Pressing Down 219
Making Electrical Contact 219
Strain Relief 219
Testing 219
Testing with Continuity Testers 220
Testing for Signal Quality 220
Chapter 5b HANDS-ON: ETHERNET SWITCHING 221
The Exercise 221
What You Will Need 221
Creating the Network 221
Creating a Loop 222
Chapter 6 WIRELESS LANs I 223
Christopher Lorek 223
Introduction 224
Basic 802.11 Wireless LAN (WLAN) Operation 224
Radio Signal Propagation 225
Frequencies 226
Antennas 227
Wireless Propagation Problems 228
Radio Bands, Bandwidth, and Spread Spectrum Transmission 230
Radio Bands 230
Signal and Channel Bandwidth 231
The Golden Zone 234
Licensed and Unlicensed Radio Bands 234
The 2.4 GHz and 5 GHz Unlicensed Bands 235
Normal and Spread Spectrum Transmission 238
Why Spread Spectrum Transmission? 238
Spread Spectrum Transmission Methods 239
802.11 WLAN Operation 240
Extending the Wired LAN 241
Wireless Access Points 241
Basic Service Sets (BSSs) 242
Extended Service Sets (ESSS), Handoff, and Roaming 243
Sharing a Single Channel 244
Controlling 802.11 Transmission 245
802.11 Transmission Standards 247
Characteristics of 802.11g, 802.11n, 802.11ac, and 802.11 ad 247
Spread Spectrum Method 249
Bands and Channel Bandwidth 250
MIMO 250
Beamforrning and Multiuser MIMO 252
Speed, Throughput, and Distance 252
Backward Compatibility 254
On the Horizon 254
Advanced Operation 255
Wi-Fi Direct 255
Mesh Networking 256
Standards and Compatibility 257
Conclusion 257
Synopsis 257
End-of-Chapter Questions 260
Chapter 6a USING XIRRUS WI-FI INSPECTOR 261
Introduction 261
The Four Windows 261
The Radar Window (Read the Fine Print) 261
Connection Window 263
The Networks Window 264
Signal History 265
Other Groups on the Ribbon 266
Tests 266
Connection Test 266
Speed Test 267
Quality Test 267
Activities 267
Chapter 7 WIRELESS LANs II 269
Introduction 269
TJX 269
802.11 WLAN Security 272
WLAN Security Threats 272
802.11 Core Security Standards 273
Wired Equivalent Privacy (WEP) Security 273
WPA (Wireless Protected Access) 275
802.11i(WPA2) 275
802.1X Mode Operation with Added
Client-Access Point Security 276
Pre-Shared Key (PSK) Mode 277
Evil Twin Access Points and Virtual Private Networks (VPNs) 278
Wi-Fi Protected Setup 280
Denial-of-Service Attacks 281
802.11 Wireless LAN Management 281
Access Point Placement 282
Remote Management: Smart Access Points versus
Wireless Switches 283
Expressing Power Ratios in Decibels 285
Other Local Wireless Technologies 289
Bluetooth 290
Near Field Communication (NFC) 296
Ultrawideband (UWB) 299
Security in Emerging Local Wireless Transmission Technologies 299
Conclusion 301
Synopsis 301
End-of-Chapter Question 302
Chapter 8 TCP/IP INTERNETWORKING I 303
Introduction 303
TCP/IP Recap 303
The TCP/IP Architecture and the IETF 303
Simple IP at the Internet Layer 304
Reliable Heavyweight TCP at the Transport Layer 304
Unreliable Lightweight UDP at the Transport Layer 305
IP Routing 305
Hierarchical IP Addressing 305
Routers, Networks, and Subnets 307
Network and Subnet Masks 308
How Routers Process Packets 310
Switching versus Routing 310
Routing Table 313
Rows Are Routes 313
Step 1: Finding All Row Matches 314
Step 2: Selecting the Best-Match Row 315
Step 3: Sending the Packet Back Out 316
Cheating (Decision Caching) 317
Masking When Masks Do Not Break at 8-Bit Boundaries 318
The Address Resolution Protocol 318
The Internet Protocol Version 4 (IPv4) Fields 320
IP Time to Live (TTL) Field 321
IP Protocol Field 321
IP Identification, Flags, and Fragment Offset Fields 321
IP Options 322
IPDiff-Serv 322
IP Version 6 (IPv6) 322
Outgrowing IPv4 322
IPv6 323
Writing 128-Bit IPv6 Addresses 323
The IPv6 Header 325
Extension Headers 328
The Transmission Control Protocol (TCP) 330
Fields in TCP/IP Segments 330
Openings and Abrupt TCP Closes 332
The User Datagram Protocol (UDP) 333
Other TCP/IP Standards 334
Dynamic Routing Protocols 334
Internet Control Message Protocol (ICMP) for Supervisory Messages
at the Internet Layer 336
Conclusion 337
Synopsis 337
End-of-Chapter Questions 339
Chapter 9 TCP/IP INTERNETWORKING II 341
Introduction 341
Core TCP/IP Management Tasks 341
IP Subnet Planning 341
Network Address Translation (NAT) 343
The Domain Name System (DNS) 345
DHCP Servers 348
Simple Network Management Protocol (SNMP) 349
Multiprotocol Label Switching 353
Making Routing More Efficient 353
MPLS Operation 354
Benefits of Label Switching 355
MPLS Boundaries 355
Securing Internet Transmission 356
Virtual Private Networks 356
IPsecVPNs 357
IPsec Transport Mode 357
IPsec Tunnel Mode 357
Remote-Access and Site-to-Site VPNs 358
IPsec Security Associations and Policy Servers 358
SSL/TLSVPNs 359
Managing IP Version 6 (IPv6) 361
Internet Layer Protocol Stacks 361
IPv6 Subnetting 362
IPv6 Configuration 365
Other IPv6 Standards 369
Conclusion 370
Synopsis 370
End-of-Chapter Questions 372
Chapter 10 WIDE AREA NETWORKS 373
LANs and WANs (and MANs) 373
LANs versus MANs and WANs 373
Other Aspects of WANs 375
The Three Basic WAN Components 376
Wired Access Links 377
Public Switched Telephone Network (PSTN) Access Lines 377
Business Leased Lines 380
Leased Line Speeds 381
Business Digital Subscriber Line (DSL) Service 383
Residential DSL Service 385
Cable Modem Service 387
The Network Core 389
Leased Line Wide Area Networks 389
Public Switched Data Network (PSDN) 390
Virtual Circuit Operation 393
Using the Internet for Wide Area Networking 394
Attractions and Issues 395
Securing the Internet 395
Using a Single ISP 396
Cellular Data Service 397
Cellular Service 397
Cells 397
Why Cells? 398
Handoffs versus Roaming 400
Using Cellular Telephony for Data Transmission 400
Lies, Damned Lies, and Mobile Service Speeds 403
Cellular-Wi-Fi Convergence 405
Virtual Wide Area Networks (Virtual WANs) 406
Conclusion 407
Synopsis 407
End-of-Chapter Questions 410
Chapter 11 NETWORKED APPLICATIONS 411
Papa Murphy s 411
Introduction 412
Networked Applications 412
The Evolution of Client Devices and Networking 413
Application Security 415
Electronic Mail (E-Mail) 416
Importance 416
E-Mail Standards 417
Simple Mail Transfer Protocol (SMTP) 418
Receiving Mail (POP and IMAP) 419
Web-Enabled E-Mail 419
Malware Filtering in E-Mail 419
Voice over IP (VOIP) 421
Basics 421
VoIP Signaling 422
VoIP Transport 423
The World Wide Web 424
HTTP and HTML Standards 424
Complex Webpages 425
HTTP Request and Response Messages 426
Cloud Computing 427
A Shared Project 427
Cloud Computing 429
Software as a Service (SaaS) 430
Cloud Utility Computing 431
Why Is Cloud Computing a Hot Topic Now? 433
Managing Cloud Computing 435
Service-Oriented Architectures 436
Traditional Software Architectures and
Service-Oriented Architectures (SAAS) 436
Reuse and Language Independence 437
Web Services 438
Perspective 440
Peer-to-Peer (P2P) Application Architectures 440
Traditional Client/Server Applications 441
P2P Applications 442
P2P File-Sharing Applications: BitTorrent 442
P2P Communication Applications: Skype 446
P2P Processing Applications: SETI Home 449
Facilitating Servers and P2P Applications 450
Conclusion 450
Synopsis 450
End-of-Chapter Questions 452
Online Modules
(available at www.pearsonhighered.com/panko)
Module A MORE ON TCP
More on TCP
Numbering Octets
Ordering TCP Segments upon Arrival
The TCP Acknowledgment Process
Flow Control: Window Size
Review Questions
Module B MORE ON MODULATION
Modulation
Frequency Modulation
Amplitude Modulation
Phase Modulation
Quadrature Amplitude Modulation (QAM)
Review Questions
Module C MORE ON TELECOMMUNICATIONS
Introduction
The PSTN Transport Core and Signaling
The Transport Core
Time Division Multiplexing (TDM) Lines
Leased Lines and Trunk Lines
Asynchronous Transfer Mode (ATM) Transport
Signaling
Communication Satellites
Microwave Transmission
Satellite Transmission
Geosynchronous Earth Orbit (GEO) Satellites
Low Earth Orbit (LEO) and Medium Earth Orbit (MEO) Satellites
VSAT Satellites
Wiring the First Bank of Paradise Headquarters Building
Facilities
Telephone Wiring
Data Wiring
Plenum Cabling
PBX Services
Carrier Services and Pricing
Basic Voice Services
Advanced Services
Call Waiting
Voice Mail
Telephone Carriers and Regulation
PTTs and Ministries of Telecommunications
AT T, the FCC, and PUCs
Deregulation
Voice over IP
Module D DIRECTORY SERVERS
Introduction
Hierarchical Organization
Lightweight Directory Access Protocol (LDAP)
Directory Servers and the Networking Staff
Microsoft s Active Directory (AD)
Active Directory Domains
Domain Controllers
Domains in an Active Directory Tree
Complex Structures
Authentication and Directory Servers
Glossary 453
Index 483
|
any_adam_object | 1 |
author | Panko, Raymond R. |
author_GND | (DE-588)1041697783 (DE-588)143697358 |
author_facet | Panko, Raymond R. |
author_role | aut |
author_sort | Panko, Raymond R. |
author_variant | r r p rr rrp |
building | Verbundindex |
bvnumber | BV041362219 |
classification_rvk | ST 276 |
ctrlnum | (OCoLC)862824122 (DE-599)BVBBV041362219 |
discipline | Informatik |
edition | 9. ed., internat. ed. |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01940nam a2200505 c 4500</leader><controlfield tag="001">BV041362219</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20131023 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">131016s2013 a||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780133080452</subfield><subfield code="9">978-0-13-308045-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0133080455</subfield><subfield code="9">0-13-308045-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)862824122</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV041362219</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-92</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Panko, Raymond R.</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1041697783</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Business data networks and security</subfield><subfield code="c">Raymond R. Panko ; Julia L. Panko</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">9. ed., internat. ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boston [u.a.]</subfield><subfield code="b">Pearson</subfield><subfield code="c">2013</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XXIV, 500 S.</subfield><subfield code="b">Ill.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Always learning</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Business enterprises / Computer networks / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks / Managment</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Unternehmen</subfield><subfield code="2">gnd</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="2">gnd</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="2">gnd</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Unternehmen</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Panko, Julia L.</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)143697358</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">HBZ Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026810543&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-026810543</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield></record></collection> |
id | DE-604.BV041362219 |
illustrated | Illustrated |
indexdate | 2024-07-10T00:54:58Z |
institution | BVB |
isbn | 9780133080452 0133080455 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-026810543 |
oclc_num | 862824122 |
open_access_boolean | |
owner | DE-92 |
owner_facet | DE-92 |
physical | XXIV, 500 S. Ill. |
publishDate | 2013 |
publishDateSearch | 2013 |
publishDateSort | 2013 |
publisher | Pearson |
record_format | marc |
series2 | Always learning |
spelling | Panko, Raymond R. Verfasser (DE-588)1041697783 aut Business data networks and security Raymond R. Panko ; Julia L. Panko 9. ed., internat. ed. Boston [u.a.] Pearson 2013 XXIV, 500 S. Ill. txt rdacontent n rdamedia nc rdacarrier Always learning Includes index Business enterprises / Computer networks / Security measures Computer networks / Managment Computer networks / Security measures Computer security Unternehmen gnd Rechnernetz gnd Computersicherheit gnd Unternehmen Rechnernetz (DE-588)4070085-9 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Computersicherheit (DE-588)4274324-2 s Rechnernetz (DE-588)4070085-9 s 1\p DE-604 Panko, Julia L. Sonstige (DE-588)143697358 oth HBZ Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026810543&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Panko, Raymond R. Business data networks and security Business enterprises / Computer networks / Security measures Computer networks / Managment Computer networks / Security measures Computer security Unternehmen gnd Rechnernetz gnd Computersicherheit gnd Unternehmen Rechnernetz (DE-588)4070085-9 gnd Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)4070085-9 (DE-588)4274324-2 |
title | Business data networks and security |
title_auth | Business data networks and security |
title_exact_search | Business data networks and security |
title_full | Business data networks and security Raymond R. Panko ; Julia L. Panko |
title_fullStr | Business data networks and security Raymond R. Panko ; Julia L. Panko |
title_full_unstemmed | Business data networks and security Raymond R. Panko ; Julia L. Panko |
title_short | Business data networks and security |
title_sort | business data networks and security |
topic | Business enterprises / Computer networks / Security measures Computer networks / Managment Computer networks / Security measures Computer security Unternehmen gnd Rechnernetz gnd Computersicherheit gnd Unternehmen Rechnernetz (DE-588)4070085-9 gnd Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Business enterprises / Computer networks / Security measures Computer networks / Managment Computer networks / Security measures Computer security Unternehmen Rechnernetz Computersicherheit |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026810543&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT pankoraymondr businessdatanetworksandsecurity AT pankojulial businessdatanetworksandsecurity |