Bulletproofing TCP/IP-based Windows NT/2000 networks:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Chichester [England]
John Wiley
©2001
|
Schlagworte: | |
Online-Zugang: | FRO01 UBG01 Volltext |
Beschreibung: | Includes index Find out about TCP/IP based network attack methods and threats to Windows NT/2000 computers and the preventive measures you can use to protect your infrastructure. "Bulletproofing TCP/IP-based Windows NT/2000 Networks" details the use of router access lists, firewalls, virus scanners and encryption. It includes examples of the configuration of hardware and software to prevent or minimize the effect of a wide range of communications-based attacks against TCP/IP networks and Windows NT/2000 hosts connected to such networks.; It covers how TCP/IP operates and how TCP/IP attacks occur and provides detailed coverage on how to secure both TCP/IP networks and the Windows NT/2000 host on such networks against different attack methods. It also describes a new attack method, "script-form attack", which could cause a company financial problems and its prevention. Practical real-world examples of methods used to block potential attacks are used |
Beschreibung: | 1 Online-Ressource (xvii, 290 pages) |
ISBN: | 0470852275 9780470852279 0470841605 9780470841600 1280555033 9781280555039 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043384715 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 160222s2001 |||| o||u| ||||||eng d | ||
020 | |a 0470852275 |c electronic bk. |9 0-470-85227-5 | ||
020 | |a 9780470852279 |c electronic bk. |9 978-0-470-85227-9 | ||
020 | |a 0470841605 |c electronic bk. |9 0-470-84160-5 | ||
020 | |a 9780470841600 |c electronic bk. |9 978-0-470-84160-0 | ||
020 | |a 1280555033 |9 1-280-55503-3 | ||
020 | |a 9781280555039 |9 978-1-280-55503-9 | ||
024 | 7 | |a 10.1002/0470841605 |2 doi | |
035 | |a (ZDB-35-WIC)ocm51814021 | ||
035 | |a (OCoLC)51814021 | ||
035 | |a (DE-599)BVBBV043384715 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-861 | ||
082 | 0 | |a 004.6/2 |2 21 | |
100 | 1 | |a Held, Gilbert |e Verfasser |4 aut | |
245 | 1 | 0 | |a Bulletproofing TCP/IP-based Windows NT/2000 networks |c Gilbert Held |
264 | 1 | |a Chichester [England] |b John Wiley |c ©2001 | |
300 | |a 1 Online-Ressource (xvii, 290 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes index | ||
500 | |a Find out about TCP/IP based network attack methods and threats to Windows NT/2000 computers and the preventive measures you can use to protect your infrastructure. "Bulletproofing TCP/IP-based Windows NT/2000 Networks" details the use of router access lists, firewalls, virus scanners and encryption. It includes examples of the configuration of hardware and software to prevent or minimize the effect of a wide range of communications-based attacks against TCP/IP networks and Windows NT/2000 hosts connected to such networks.; It covers how TCP/IP operates and how TCP/IP attacks occur and provides detailed coverage on how to secure both TCP/IP networks and the Windows NT/2000 host on such networks against different attack methods. It also describes a new attack method, "script-form attack", which could cause a company financial problems and its prevention. Practical real-world examples of methods used to block potential attacks are used | ||
630 | 0 | 4 | |a Microsoft Windows NT. |
650 | 7 | |a Microsoft Windows NT. |2 fast | |
650 | 7 | |a COMPUTERS / Networking / Network Protocols |2 bisacsh | |
650 | 7 | |a TCP/IP (Computer network protocol) |2 fast | |
650 | 4 | |a TCP/IP (Computer network protocol) | |
856 | 4 | 0 | |u https://onlinelibrary.wiley.com/doi/book/10.1002/0470841605 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-35-WIC | ||
940 | 1 | |q UBG_PDA_WIC | |
999 | |a oai:aleph.bib-bvb.de:BVB01-028803299 | ||
966 | e | |u https://onlinelibrary.wiley.com/doi/book/10.1002/0470841605 |l FRO01 |p ZDB-35-WIC |q FRO_PDA_WIC |x Verlag |3 Volltext | |
966 | e | |u https://onlinelibrary.wiley.com/doi/book/10.1002/0470841605 |l UBG01 |p ZDB-35-WIC |q UBG_PDA_WIC |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175952166518784 |
---|---|
any_adam_object | |
author | Held, Gilbert |
author_facet | Held, Gilbert |
author_role | aut |
author_sort | Held, Gilbert |
author_variant | g h gh |
building | Verbundindex |
bvnumber | BV043384715 |
collection | ZDB-35-WIC |
ctrlnum | (ZDB-35-WIC)ocm51814021 (OCoLC)51814021 (DE-599)BVBBV043384715 |
dewey-full | 004.6/2 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004.6/2 |
dewey-search | 004.6/2 |
dewey-sort | 14.6 12 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02838nmm a2200493zc 4500</leader><controlfield tag="001">BV043384715</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">160222s2001 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0470852275</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-470-85227-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780470852279</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-470-85227-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0470841605</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-470-84160-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780470841600</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-470-84160-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1280555033</subfield><subfield code="9">1-280-55503-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781280555039</subfield><subfield code="9">978-1-280-55503-9</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1002/0470841605</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-35-WIC)ocm51814021</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)51814021</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043384715</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-861</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004.6/2</subfield><subfield code="2">21</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Held, Gilbert</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Bulletproofing TCP/IP-based Windows NT/2000 networks</subfield><subfield code="c">Gilbert Held</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Chichester [England]</subfield><subfield code="b">John Wiley</subfield><subfield code="c">©2001</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xvii, 290 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Find out about TCP/IP based network attack methods and threats to Windows NT/2000 computers and the preventive measures you can use to protect your infrastructure. "Bulletproofing TCP/IP-based Windows NT/2000 Networks" details the use of router access lists, firewalls, virus scanners and encryption. It includes examples of the configuration of hardware and software to prevent or minimize the effect of a wide range of communications-based attacks against TCP/IP networks and Windows NT/2000 hosts connected to such networks.; It covers how TCP/IP operates and how TCP/IP attacks occur and provides detailed coverage on how to secure both TCP/IP networks and the Windows NT/2000 host on such networks against different attack methods. It also describes a new attack method, "script-form attack", which could cause a company financial problems and its prevention. Practical real-world examples of methods used to block potential attacks are used</subfield></datafield><datafield tag="630" ind1="0" ind2="4"><subfield code="a">Microsoft Windows NT.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Microsoft Windows NT.</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Network Protocols</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">TCP/IP (Computer network protocol)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">TCP/IP (Computer network protocol)</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/0470841605</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-35-WIC</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">UBG_PDA_WIC</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028803299</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/0470841605</subfield><subfield code="l">FRO01</subfield><subfield code="p">ZDB-35-WIC</subfield><subfield code="q">FRO_PDA_WIC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/0470841605</subfield><subfield code="l">UBG01</subfield><subfield code="p">ZDB-35-WIC</subfield><subfield code="q">UBG_PDA_WIC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043384715 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:24:27Z |
institution | BVB |
isbn | 0470852275 9780470852279 0470841605 9780470841600 1280555033 9781280555039 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028803299 |
oclc_num | 51814021 |
open_access_boolean | |
owner | DE-861 |
owner_facet | DE-861 |
physical | 1 Online-Ressource (xvii, 290 pages) |
psigel | ZDB-35-WIC UBG_PDA_WIC ZDB-35-WIC FRO_PDA_WIC ZDB-35-WIC UBG_PDA_WIC |
publishDate | 2001 |
publishDateSearch | 2001 |
publishDateSort | 2001 |
publisher | John Wiley |
record_format | marc |
spelling | Held, Gilbert Verfasser aut Bulletproofing TCP/IP-based Windows NT/2000 networks Gilbert Held Chichester [England] John Wiley ©2001 1 Online-Ressource (xvii, 290 pages) txt rdacontent c rdamedia cr rdacarrier Includes index Find out about TCP/IP based network attack methods and threats to Windows NT/2000 computers and the preventive measures you can use to protect your infrastructure. "Bulletproofing TCP/IP-based Windows NT/2000 Networks" details the use of router access lists, firewalls, virus scanners and encryption. It includes examples of the configuration of hardware and software to prevent or minimize the effect of a wide range of communications-based attacks against TCP/IP networks and Windows NT/2000 hosts connected to such networks.; It covers how TCP/IP operates and how TCP/IP attacks occur and provides detailed coverage on how to secure both TCP/IP networks and the Windows NT/2000 host on such networks against different attack methods. It also describes a new attack method, "script-form attack", which could cause a company financial problems and its prevention. Practical real-world examples of methods used to block potential attacks are used Microsoft Windows NT. Microsoft Windows NT. fast COMPUTERS / Networking / Network Protocols bisacsh TCP/IP (Computer network protocol) fast TCP/IP (Computer network protocol) https://onlinelibrary.wiley.com/doi/book/10.1002/0470841605 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Held, Gilbert Bulletproofing TCP/IP-based Windows NT/2000 networks Microsoft Windows NT. Microsoft Windows NT. fast COMPUTERS / Networking / Network Protocols bisacsh TCP/IP (Computer network protocol) fast TCP/IP (Computer network protocol) |
title | Bulletproofing TCP/IP-based Windows NT/2000 networks |
title_auth | Bulletproofing TCP/IP-based Windows NT/2000 networks |
title_exact_search | Bulletproofing TCP/IP-based Windows NT/2000 networks |
title_full | Bulletproofing TCP/IP-based Windows NT/2000 networks Gilbert Held |
title_fullStr | Bulletproofing TCP/IP-based Windows NT/2000 networks Gilbert Held |
title_full_unstemmed | Bulletproofing TCP/IP-based Windows NT/2000 networks Gilbert Held |
title_short | Bulletproofing TCP/IP-based Windows NT/2000 networks |
title_sort | bulletproofing tcp ip based windows nt 2000 networks |
topic | Microsoft Windows NT. Microsoft Windows NT. fast COMPUTERS / Networking / Network Protocols bisacsh TCP/IP (Computer network protocol) fast TCP/IP (Computer network protocol) |
topic_facet | Microsoft Windows NT. COMPUTERS / Networking / Network Protocols TCP/IP (Computer network protocol) |
url | https://onlinelibrary.wiley.com/doi/book/10.1002/0470841605 |
work_keys_str_mv | AT heldgilbert bulletproofingtcpipbasedwindowsnt2000networks |