Hack proofing Windows 2000:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Rockland, MA
Syngress
©2001
|
Schlagworte: | |
Online-Zugang: | FAW01 FAW02 Volltext |
Beschreibung: | Includes index Paralleltitel: Hack proofing Windows 2000 server The complete, authoritative guide to protecting your Windows 2000 Network "Essential reading for your IT security organization."--Deena Joyce, Director of Information Technology and Network Security, Casino Magic Pick up a newspaper or watch the evening news and you will find a major news story involving a breech of network security. Windows 2000, as the premier network platform, has many important security features but they are difficult to configure and manage. Hack Proofing Windows 2000 Server has totally up-to-date coverage of Service Pack 2 (SP2), Kerberos and Public Key Infrastructure and also addresses newer topics such as Virtual Private Networks (VPNs), remote access and web site security. The book also has complete coverage of Internet Information Server (IIS) release 5. A great addition to the bestselling "Hack Proofing ..." series Windows 2000 sales have surpassed those of Windows NT Critical topic. The security of an organization's data and communications is crucial to its survival and these topics are notoriously difficult to grasp Unrivalled web support at www.solutions@syngress.com |
Beschreibung: | 1 Online-Ressource (xxv, 693 pages) |
ISBN: | 1931836493 1932266151 9781931836494 9781932266153 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043083469 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 151126s2001 |||| o||u| ||||||eng d | ||
020 | |a 1931836493 |9 1-931836-49-3 | ||
020 | |a 1932266151 |9 1-932266-15-1 | ||
020 | |a 9781931836494 |9 978-1-931836-49-4 | ||
020 | |a 9781932266153 |9 978-1-932266-15-3 | ||
035 | |a (OCoLC)51563418 | ||
035 | |a (DE-599)BVBBV043083469 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-1047 | ||
082 | 0 | |a 005.8 |2 21 | |
100 | 1 | |a Todd, Chad |e Verfasser |4 aut | |
245 | 1 | 0 | |a Hack proofing Windows 2000 |c Chad Todd ; Norris L. Johnson, Jr., technical editor |
246 | 1 | 3 | |a Hack proofing Windows 2000 server |
264 | 1 | |a Rockland, MA |b Syngress |c ©2001 | |
300 | |a 1 Online-Ressource (xxv, 693 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes index | ||
500 | |a Paralleltitel: Hack proofing Windows 2000 server | ||
500 | |a The complete, authoritative guide to protecting your Windows 2000 Network "Essential reading for your IT security organization."--Deena Joyce, Director of Information Technology and Network Security, Casino Magic Pick up a newspaper or watch the evening news and you will find a major news story involving a breech of network security. Windows 2000, as the premier network platform, has many important security features but they are difficult to configure and manage. Hack Proofing Windows 2000 Server has totally up-to-date coverage of Service Pack 2 (SP2), Kerberos and Public Key Infrastructure and also addresses newer topics such as Virtual Private Networks (VPNs), remote access and web site security. The book also has complete coverage of Internet Information Server (IIS) release 5. A great addition to the bestselling "Hack Proofing ..." series Windows 2000 sales have surpassed those of Windows NT Critical topic. The security of an organization's data and communications is crucial to its survival and these topics are notoriously difficult to grasp Unrivalled web support at www.solutions@syngress.com | ||
650 | 4 | |a Microsoft Windows 2000 server | |
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a Computer networks / Security measures |2 fast | |
650 | 7 | |a Computer security |2 fast | |
650 | 4 | |a Computer security | |
650 | 4 | |a Computer networks |x Security measures | |
700 | 1 | |a Johnson, Norris L. |e Sonstige |4 oth | |
856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=75915 |x Aggregator |3 Volltext |
912 | |a ZDB-4-EBA | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-028507661 | ||
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=75915 |l FAW01 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=75915 |l FAW02 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175477483503616 |
---|---|
any_adam_object | |
author | Todd, Chad |
author_facet | Todd, Chad |
author_role | aut |
author_sort | Todd, Chad |
author_variant | c t ct |
building | Verbundindex |
bvnumber | BV043083469 |
collection | ZDB-4-EBA |
ctrlnum | (OCoLC)51563418 (DE-599)BVBBV043083469 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03128nmm a2200505zc 4500</leader><controlfield tag="001">BV043083469</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151126s2001 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1931836493</subfield><subfield code="9">1-931836-49-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1932266151</subfield><subfield code="9">1-932266-15-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781931836494</subfield><subfield code="9">978-1-931836-49-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781932266153</subfield><subfield code="9">978-1-932266-15-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)51563418</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043083469</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">21</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Todd, Chad</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Hack proofing Windows 2000</subfield><subfield code="c">Chad Todd ; Norris L. Johnson, Jr., technical editor</subfield></datafield><datafield tag="246" ind1="1" ind2="3"><subfield code="a">Hack proofing Windows 2000 server</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Rockland, MA</subfield><subfield code="b">Syngress</subfield><subfield code="c">©2001</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxv, 693 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Paralleltitel: Hack proofing Windows 2000 server</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">The complete, authoritative guide to protecting your Windows 2000 Network "Essential reading for your IT security organization."--Deena Joyce, Director of Information Technology and Network Security, Casino Magic Pick up a newspaper or watch the evening news and you will find a major news story involving a breech of network security. Windows 2000, as the premier network platform, has many important security features but they are difficult to configure and manage. Hack Proofing Windows 2000 Server has totally up-to-date coverage of Service Pack 2 (SP2), Kerberos and Public Key Infrastructure and also addresses newer topics such as Virtual Private Networks (VPNs), remote access and web site security. The book also has complete coverage of Internet Information Server (IIS) release 5. A great addition to the bestselling "Hack Proofing ..." series Windows 2000 sales have surpassed those of Windows NT Critical topic. The security of an organization's data and communications is crucial to its survival and these topics are notoriously difficult to grasp Unrivalled web support at www.solutions@syngress.com</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Microsoft Windows 2000 server</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Johnson, Norris L.</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=75915</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028507661</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=75915</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=75915</subfield><subfield code="l">FAW02</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043083469 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:16:55Z |
institution | BVB |
isbn | 1931836493 1932266151 9781931836494 9781932266153 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028507661 |
oclc_num | 51563418 |
open_access_boolean | |
owner | DE-1046 DE-1047 |
owner_facet | DE-1046 DE-1047 |
physical | 1 Online-Ressource (xxv, 693 pages) |
psigel | ZDB-4-EBA ZDB-4-EBA FAW_PDA_EBA |
publishDate | 2001 |
publishDateSearch | 2001 |
publishDateSort | 2001 |
publisher | Syngress |
record_format | marc |
spelling | Todd, Chad Verfasser aut Hack proofing Windows 2000 Chad Todd ; Norris L. Johnson, Jr., technical editor Hack proofing Windows 2000 server Rockland, MA Syngress ©2001 1 Online-Ressource (xxv, 693 pages) txt rdacontent c rdamedia cr rdacarrier Includes index Paralleltitel: Hack proofing Windows 2000 server The complete, authoritative guide to protecting your Windows 2000 Network "Essential reading for your IT security organization."--Deena Joyce, Director of Information Technology and Network Security, Casino Magic Pick up a newspaper or watch the evening news and you will find a major news story involving a breech of network security. Windows 2000, as the premier network platform, has many important security features but they are difficult to configure and manage. Hack Proofing Windows 2000 Server has totally up-to-date coverage of Service Pack 2 (SP2), Kerberos and Public Key Infrastructure and also addresses newer topics such as Virtual Private Networks (VPNs), remote access and web site security. The book also has complete coverage of Internet Information Server (IIS) release 5. A great addition to the bestselling "Hack Proofing ..." series Windows 2000 sales have surpassed those of Windows NT Critical topic. The security of an organization's data and communications is crucial to its survival and these topics are notoriously difficult to grasp Unrivalled web support at www.solutions@syngress.com Microsoft Windows 2000 server COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Computer security fast Computer security Computer networks Security measures Johnson, Norris L. Sonstige oth http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=75915 Aggregator Volltext |
spellingShingle | Todd, Chad Hack proofing Windows 2000 Microsoft Windows 2000 server COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Computer security fast Computer security Computer networks Security measures |
title | Hack proofing Windows 2000 |
title_alt | Hack proofing Windows 2000 server |
title_auth | Hack proofing Windows 2000 |
title_exact_search | Hack proofing Windows 2000 |
title_full | Hack proofing Windows 2000 Chad Todd ; Norris L. Johnson, Jr., technical editor |
title_fullStr | Hack proofing Windows 2000 Chad Todd ; Norris L. Johnson, Jr., technical editor |
title_full_unstemmed | Hack proofing Windows 2000 Chad Todd ; Norris L. Johnson, Jr., technical editor |
title_short | Hack proofing Windows 2000 |
title_sort | hack proofing windows 2000 |
topic | Microsoft Windows 2000 server COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Computer security fast Computer security Computer networks Security measures |
topic_facet | Microsoft Windows 2000 server COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General Computer networks / Security measures Computer security Computer networks Security measures |
url | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=75915 |
work_keys_str_mv | AT toddchad hackproofingwindows2000 AT johnsonnorrisl hackproofingwindows2000 AT toddchad hackproofingwindows2000server AT johnsonnorrisl hackproofingwindows2000server |