Internet security: a jumpstart for systems administrators and IT managers
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Amsterdam
Digital Press
c2003
|
Schlagworte: | |
Online-Zugang: | FAW01 Volltext |
Beschreibung: | Includes index Includes bibliographical references (p. 321-389) and index Internet Security incorporates not only the technology needed to support a solid security strategy but also those policies and processes that must be incorporated in order for that strategy to work. New methods of breaking into corporate networks are resulting in major losses. This book provides the latest information on how to guard against attacks and informs the IT manager of the products that can detect and prevent break-ins. Crucial concepts such as authentication and encryption are explained, enabling the reader to understand when and where these technologies will be useful. Due to the authors' experiences in helping corporations develop secure networks, they are able to include the newest methods for protecting corporate data. Shield data from both the internal and external intruder Discover products that can detect and prevent these break-ins Protect against major losses with the latest incident handling procedures for detecting and recovering data from new viruses Get details of a full security business review from performing the security risk analysis to justifying security expenditures based on your company's business needs |
Beschreibung: | 1 Online-Ressource (xviii, 398 p.) |
ISBN: | 1555582982 9781555582982 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV042307573 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 150129s2003 |||| o||u| ||||||eng d | ||
020 | |a 1555582982 |9 1-55558-298-2 | ||
020 | |a 9781555582982 |9 978-1-55558-298-2 | ||
035 | |a (OCoLC)174142945 | ||
035 | |a (DE-599)BVBBV042307573 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 | ||
082 | 0 | |a 005.8 |2 22 | |
100 | 1 | |a Speed, Tim |e Verfasser |4 aut | |
245 | 1 | 0 | |a Internet security |b a jumpstart for systems administrators and IT managers |c Tim Speed, Juanita Ellis |
264 | 1 | |a Amsterdam |b Digital Press |c c2003 | |
300 | |a 1 Online-Ressource (xviii, 398 p.) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes index | ||
500 | |a Includes bibliographical references (p. 321-389) and index | ||
500 | |a Internet Security incorporates not only the technology needed to support a solid security strategy but also those policies and processes that must be incorporated in order for that strategy to work. New methods of breaking into corporate networks are resulting in major losses. This book provides the latest information on how to guard against attacks and informs the IT manager of the products that can detect and prevent break-ins. Crucial concepts such as authentication and encryption are explained, enabling the reader to understand when and where these technologies will be useful. Due to the authors' experiences in helping corporations develop secure networks, they are able to include the newest methods for protecting corporate data. Shield data from both the internal and external intruder Discover products that can detect and prevent these break-ins Protect against major losses with the latest incident handling procedures for detecting and recovering data from new viruses Get details of a full security business review from performing the security risk analysis to justifying security expenditures based on your company's business needs | ||
650 | 7 | |a Computer networks / Security measures |2 fast | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Internet / Security measures |2 fast | |
650 | 4 | |a Internet |x Security measures | |
650 | 4 | |a Computer networks |x Security measures | |
650 | 4 | |a Computer security | |
700 | 1 | |a Ellis, Juanita |e Sonstige |4 oth | |
856 | 4 | 0 | |u http://www.sciencedirect.com/science/book/9781555582982 |x Verlag |3 Volltext |
912 | |a ZDB-33-ESD | ||
940 | 1 | |q FLA_PDA_ESD | |
999 | |a oai:aleph.bib-bvb.de:BVB01-027744565 | ||
966 | e | |u http://www.sciencedirect.com/science/book/9781555582982 |l FAW01 |p ZDB-33-ESD |q FAW_PDA_ESD |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804152893029220352 |
---|---|
any_adam_object | |
author | Speed, Tim |
author_facet | Speed, Tim |
author_role | aut |
author_sort | Speed, Tim |
author_variant | t s ts |
building | Verbundindex |
bvnumber | BV042307573 |
collection | ZDB-33-ESD |
ctrlnum | (OCoLC)174142945 (DE-599)BVBBV042307573 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02717nmm a2200445zc 4500</leader><controlfield tag="001">BV042307573</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">150129s2003 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1555582982</subfield><subfield code="9">1-55558-298-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781555582982</subfield><subfield code="9">978-1-55558-298-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)174142945</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042307573</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Speed, Tim</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Internet security</subfield><subfield code="b">a jumpstart for systems administrators and IT managers</subfield><subfield code="c">Tim Speed, Juanita Ellis</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Amsterdam</subfield><subfield code="b">Digital Press</subfield><subfield code="c">c2003</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xviii, 398 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references (p. 321-389) and index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Internet Security incorporates not only the technology needed to support a solid security strategy but also those policies and processes that must be incorporated in order for that strategy to work. New methods of breaking into corporate networks are resulting in major losses. This book provides the latest information on how to guard against attacks and informs the IT manager of the products that can detect and prevent break-ins. Crucial concepts such as authentication and encryption are explained, enabling the reader to understand when and where these technologies will be useful. Due to the authors' experiences in helping corporations develop secure networks, they are able to include the newest methods for protecting corporate data. Shield data from both the internal and external intruder Discover products that can detect and prevent these break-ins Protect against major losses with the latest incident handling procedures for detecting and recovering data from new viruses Get details of a full security business review from performing the security risk analysis to justifying security expenditures based on your company's business needs</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Internet / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ellis, Juanita</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9781555582982</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">FLA_PDA_ESD</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027744565</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.sciencedirect.com/science/book/9781555582982</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-33-ESD</subfield><subfield code="q">FAW_PDA_ESD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV042307573 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T01:17:56Z |
institution | BVB |
isbn | 1555582982 9781555582982 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027744565 |
oclc_num | 174142945 |
open_access_boolean | |
owner | DE-1046 |
owner_facet | DE-1046 |
physical | 1 Online-Ressource (xviii, 398 p.) |
psigel | ZDB-33-ESD FLA_PDA_ESD ZDB-33-ESD FAW_PDA_ESD |
publishDate | 2003 |
publishDateSearch | 2003 |
publishDateSort | 2003 |
publisher | Digital Press |
record_format | marc |
spelling | Speed, Tim Verfasser aut Internet security a jumpstart for systems administrators and IT managers Tim Speed, Juanita Ellis Amsterdam Digital Press c2003 1 Online-Ressource (xviii, 398 p.) txt rdacontent c rdamedia cr rdacarrier Includes index Includes bibliographical references (p. 321-389) and index Internet Security incorporates not only the technology needed to support a solid security strategy but also those policies and processes that must be incorporated in order for that strategy to work. New methods of breaking into corporate networks are resulting in major losses. This book provides the latest information on how to guard against attacks and informs the IT manager of the products that can detect and prevent break-ins. Crucial concepts such as authentication and encryption are explained, enabling the reader to understand when and where these technologies will be useful. Due to the authors' experiences in helping corporations develop secure networks, they are able to include the newest methods for protecting corporate data. Shield data from both the internal and external intruder Discover products that can detect and prevent these break-ins Protect against major losses with the latest incident handling procedures for detecting and recovering data from new viruses Get details of a full security business review from performing the security risk analysis to justifying security expenditures based on your company's business needs Computer networks / Security measures fast Computer security fast Internet / Security measures fast Internet Security measures Computer networks Security measures Computer security Ellis, Juanita Sonstige oth http://www.sciencedirect.com/science/book/9781555582982 Verlag Volltext |
spellingShingle | Speed, Tim Internet security a jumpstart for systems administrators and IT managers Computer networks / Security measures fast Computer security fast Internet / Security measures fast Internet Security measures Computer networks Security measures Computer security |
title | Internet security a jumpstart for systems administrators and IT managers |
title_auth | Internet security a jumpstart for systems administrators and IT managers |
title_exact_search | Internet security a jumpstart for systems administrators and IT managers |
title_full | Internet security a jumpstart for systems administrators and IT managers Tim Speed, Juanita Ellis |
title_fullStr | Internet security a jumpstart for systems administrators and IT managers Tim Speed, Juanita Ellis |
title_full_unstemmed | Internet security a jumpstart for systems administrators and IT managers Tim Speed, Juanita Ellis |
title_short | Internet security |
title_sort | internet security a jumpstart for systems administrators and it managers |
title_sub | a jumpstart for systems administrators and IT managers |
topic | Computer networks / Security measures fast Computer security fast Internet / Security measures fast Internet Security measures Computer networks Security measures Computer security |
topic_facet | Computer networks / Security measures Computer security Internet / Security measures Internet Security measures Computer networks Security measures |
url | http://www.sciencedirect.com/science/book/9781555582982 |
work_keys_str_mv | AT speedtim internetsecurityajumpstartforsystemsadministratorsanditmanagers AT ellisjuanita internetsecurityajumpstartforsystemsadministratorsanditmanagers |