Security sage's guide to hardening the network infrastructure:
Gespeichert in:
Format: | Elektronisch E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
Rockland, MA
Syngress Pub.
©2004
|
Schlagworte: | |
Online-Zugang: | FAW01 FAW02 Volltext |
Beschreibung: | Title from e-book title screen (viewed Apr. 20, 2004) Cover; Contents; Foreword; Defining Perimeter and Internal Segments; Assessing Your Current Networks; Selecting the Correct Firewall; Firewall Manipulation: Attacks and Defenses; Routing Devices and Protocols; Secure Network Management; Network Switching; Defending Routers and Switches; Implementing Intrusion Detection Systems; Perimeter Network Design; Internal Network Design; Index; Related Titles Security Sage's Guide to Hardening the Network Infrastructure focuses on both perimeter and internal networks, giving IT and security administrators a complete picture of how they should design and protect their enterprises. Other books may concentrate on perimeter security or host configuration yet ignore the infrastructure connecting the two. While others tend to focus on theory and basic security background, this publication will dive right into the content and help provide real solutions to common IT security problems |
Beschreibung: | 1 Online-Ressource |
ISBN: | 0080480837 1281052620 1931836019 1931836337 9780080480831 9781281052629 9781931836012 9781931836333 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043132236 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 151126s2004 |||| o||u| ||||||eng d | ||
020 | |a 0080480837 |9 0-08-048083-7 | ||
020 | |a 1281052620 |9 1-281-05262-0 | ||
020 | |a 1931836019 |9 1-931836-01-9 | ||
020 | |a 1931836337 |9 1-931836-33-7 | ||
020 | |a 9780080480831 |9 978-0-08-048083-1 | ||
020 | |a 9781281052629 |9 978-1-281-05262-9 | ||
020 | |a 9781931836012 |9 978-1-931836-01-2 | ||
020 | |a 9781931836333 |9 978-1-931836-33-3 | ||
035 | |a (OCoLC)54985361 | ||
035 | |a (DE-599)BVBBV043132236 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-1047 | ||
082 | 0 | |a 005.8 |2 22 | |
245 | 1 | 0 | |a Security sage's guide to hardening the network infrastructure |c Steven Andrés [and others] ; foreword by Erik Pace Birkholz |
246 | 1 | 3 | |a Hardening the network infrastructure |
264 | 1 | |a Rockland, MA |b Syngress Pub. |c ©2004 | |
300 | |a 1 Online-Ressource | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Title from e-book title screen (viewed Apr. 20, 2004) | ||
500 | |a Cover; Contents; Foreword; Defining Perimeter and Internal Segments; Assessing Your Current Networks; Selecting the Correct Firewall; Firewall Manipulation: Attacks and Defenses; Routing Devices and Protocols; Secure Network Management; Network Switching; Defending Routers and Switches; Implementing Intrusion Detection Systems; Perimeter Network Design; Internal Network Design; Index; Related Titles | ||
500 | |a Security Sage's Guide to Hardening the Network Infrastructure focuses on both perimeter and internal networks, giving IT and security administrators a complete picture of how they should design and protect their enterprises. Other books may concentrate on perimeter security or host configuration yet ignore the infrastructure connecting the two. While others tend to focus on theory and basic security background, this publication will dive right into the content and help provide real solutions to common IT security problems | ||
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a Computer networks / Security measures |2 fast | |
650 | 4 | |a Computer networks |x Security measures | |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Firewall |0 (DE-588)4386332-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Firewall |0 (DE-588)4386332-2 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
689 | 1 | 0 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 1 | |8 2\p |5 DE-604 | |
689 | 2 | 0 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 2 | |8 3\p |5 DE-604 | |
700 | 1 | |a Andrés, Steven |e Sonstige |4 oth | |
856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=107438 |x Aggregator |3 Volltext |
912 | |a ZDB-4-EBA | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-028556426 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 2\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 3\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=107438 |l FAW01 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=107438 |l FAW02 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175572686864384 |
---|---|
any_adam_object | |
building | Verbundindex |
bvnumber | BV043132236 |
collection | ZDB-4-EBA |
ctrlnum | (OCoLC)54985361 (DE-599)BVBBV043132236 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03665nmm a2200649zc 4500</leader><controlfield tag="001">BV043132236</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151126s2004 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080480837</subfield><subfield code="9">0-08-048083-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1281052620</subfield><subfield code="9">1-281-05262-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1931836019</subfield><subfield code="9">1-931836-01-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1931836337</subfield><subfield code="9">1-931836-33-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080480831</subfield><subfield code="9">978-0-08-048083-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781281052629</subfield><subfield code="9">978-1-281-05262-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781931836012</subfield><subfield code="9">978-1-931836-01-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781931836333</subfield><subfield code="9">978-1-931836-33-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)54985361</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043132236</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security sage's guide to hardening the network infrastructure</subfield><subfield code="c">Steven Andrés [and others] ; foreword by Erik Pace Birkholz</subfield></datafield><datafield tag="246" ind1="1" ind2="3"><subfield code="a">Hardening the network infrastructure</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Rockland, MA</subfield><subfield code="b">Syngress Pub.</subfield><subfield code="c">©2004</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Title from e-book title screen (viewed Apr. 20, 2004)</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Cover; Contents; Foreword; Defining Perimeter and Internal Segments; Assessing Your Current Networks; Selecting the Correct Firewall; Firewall Manipulation: Attacks and Defenses; Routing Devices and Protocols; Secure Network Management; Network Switching; Defending Routers and Switches; Implementing Intrusion Detection Systems; Perimeter Network Design; Internal Network Design; Index; Related Titles</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Security Sage's Guide to Hardening the Network Infrastructure focuses on both perimeter and internal networks, giving IT and security administrators a complete picture of how they should design and protect their enterprises. Other books may concentrate on perimeter security or host configuration yet ignore the infrastructure connecting the two. While others tend to focus on theory and basic security background, this publication will dive right into the content and help provide real solutions to common IT security problems</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Firewall</subfield><subfield code="0">(DE-588)4386332-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Firewall</subfield><subfield code="0">(DE-588)4386332-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="8">3\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Andrés, Steven</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=107438</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028556426</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">3\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=107438</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=107438</subfield><subfield code="l">FAW02</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043132236 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:18:25Z |
institution | BVB |
isbn | 0080480837 1281052620 1931836019 1931836337 9780080480831 9781281052629 9781931836012 9781931836333 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028556426 |
oclc_num | 54985361 |
open_access_boolean | |
owner | DE-1046 DE-1047 |
owner_facet | DE-1046 DE-1047 |
physical | 1 Online-Ressource |
psigel | ZDB-4-EBA ZDB-4-EBA FAW_PDA_EBA |
publishDate | 2004 |
publishDateSearch | 2004 |
publishDateSort | 2004 |
publisher | Syngress Pub. |
record_format | marc |
spelling | Security sage's guide to hardening the network infrastructure Steven Andrés [and others] ; foreword by Erik Pace Birkholz Hardening the network infrastructure Rockland, MA Syngress Pub. ©2004 1 Online-Ressource txt rdacontent c rdamedia cr rdacarrier Title from e-book title screen (viewed Apr. 20, 2004) Cover; Contents; Foreword; Defining Perimeter and Internal Segments; Assessing Your Current Networks; Selecting the Correct Firewall; Firewall Manipulation: Attacks and Defenses; Routing Devices and Protocols; Secure Network Management; Network Switching; Defending Routers and Switches; Implementing Intrusion Detection Systems; Perimeter Network Design; Internal Network Design; Index; Related Titles Security Sage's Guide to Hardening the Network Infrastructure focuses on both perimeter and internal networks, giving IT and security administrators a complete picture of how they should design and protect their enterprises. Other books may concentrate on perimeter security or host configuration yet ignore the infrastructure connecting the two. While others tend to focus on theory and basic security background, this publication will dive right into the content and help provide real solutions to common IT security problems COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Computer networks Security measures Datensicherung (DE-588)4011144-1 gnd rswk-swf Firewall (DE-588)4386332-2 gnd rswk-swf Rechnernetz (DE-588)4070085-9 gnd rswk-swf Firewall (DE-588)4386332-2 s 1\p DE-604 Rechnernetz (DE-588)4070085-9 s 2\p DE-604 Datensicherung (DE-588)4011144-1 s 3\p DE-604 Andrés, Steven Sonstige oth http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=107438 Aggregator Volltext 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 2\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 3\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Security sage's guide to hardening the network infrastructure COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Computer networks Security measures Datensicherung (DE-588)4011144-1 gnd Firewall (DE-588)4386332-2 gnd Rechnernetz (DE-588)4070085-9 gnd |
subject_GND | (DE-588)4011144-1 (DE-588)4386332-2 (DE-588)4070085-9 |
title | Security sage's guide to hardening the network infrastructure |
title_alt | Hardening the network infrastructure |
title_auth | Security sage's guide to hardening the network infrastructure |
title_exact_search | Security sage's guide to hardening the network infrastructure |
title_full | Security sage's guide to hardening the network infrastructure Steven Andrés [and others] ; foreword by Erik Pace Birkholz |
title_fullStr | Security sage's guide to hardening the network infrastructure Steven Andrés [and others] ; foreword by Erik Pace Birkholz |
title_full_unstemmed | Security sage's guide to hardening the network infrastructure Steven Andrés [and others] ; foreword by Erik Pace Birkholz |
title_short | Security sage's guide to hardening the network infrastructure |
title_sort | security sage s guide to hardening the network infrastructure |
topic | COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Computer networks Security measures Datensicherung (DE-588)4011144-1 gnd Firewall (DE-588)4386332-2 gnd Rechnernetz (DE-588)4070085-9 gnd |
topic_facet | COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General Computer networks / Security measures Computer networks Security measures Datensicherung Firewall Rechnernetz |
url | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=107438 |
work_keys_str_mv | AT andressteven securitysagesguidetohardeningthenetworkinfrastructure AT andressteven hardeningthenetworkinfrastructure |