Network security: a practical approach
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Amsterdam ; Boston
Elsevier Morgan Kaufmann Publishers
2005
|
Schlagworte: | |
Beschreibung: | Print version record |
Beschreibung: | 1 online resource (xv, 365 pages) illustrations |
ISBN: | 9780123116338 0123116333 0080455379 9780080455372 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV045348701 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 181210s2005 |||| o||u| ||||||eng d | ||
020 | |a 9780123116338 |9 978-0-12-311633-8 | ||
020 | |a 0123116333 |9 0-12-311633-3 | ||
020 | |a 0080455379 |9 0-08-045537-9 | ||
020 | |a 9780080455372 |9 978-0-08-045537-2 | ||
035 | |a (ZDB-4-ITC)ocn162129994 | ||
035 | |a (OCoLC)162129994 | ||
035 | |a (DE-599)BVBBV045348701 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 005.8 |2 22 | |
100 | 1 | |a Harrington, Jan L. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Network security |b a practical approach |c Jan L. Harrington |
264 | 1 | |a Amsterdam ; Boston |b Elsevier |b Morgan Kaufmann Publishers |c 2005 | |
300 | |a 1 online resource (xv, 365 pages) |b illustrations | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Print version record | ||
505 | 8 | |a Network Security is a comprehensive resource written for anyone who plans or implements network security measures, including managers and practitioners. It offers a valuable dual perspective on security: how your network looks to hackers who want to get inside, and how you need to approach it on the inside to keep them at bay. You get all the hands-on technical advice you need to succeed, but also higher-level administrative guidance for developing an effective security policy. There may be no such thing as absolute security, but, as the author clearly demonstrates, there is a huge difference between the protection offered by routine reliance on third-party products and what you can achieve by actively making informed decisions. Youll learn to do just that with this books assessments of the risks, rewards, and trade-offs related implementing security measures. + Helps you see through a hacker's eyes so you can make your network more secure. + Provides technical advice that can be applied in any environment, on any platform, including help with intrusion detection systems, firewalls, encryption, anti-virus software, and digital certificates. + Emphasizes a wide range of administrative considerations, including security policies, user management, and control of services and devices. + Covers techniques for enhancing the physical security of your systems and network. + Explains how hackers use information-gathering to find and exploit security flaws. + Examines the most effective ways to prevent hackers from gaining root access to a server. + Addresses Denial of Service attacks, "malware," and spoofing. + Includes appendices covering the TCP/IP protocol stack, well-known ports, and reliable sources for security warnings and updates | |
650 | 4 | |a Reseaux d'ordinateurs / Securite / Mesures | |
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a Computer networks / Security measures |2 fast | |
650 | 7 | |a Computernetwerken |2 gtt | |
650 | 7 | |a Computerbeveiliging |2 gtt | |
650 | 4 | |a Computer networks |x Security measures | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |a Harrington, Jan L. |t Network security |d Amsterdam ; Boston : Elsevier : Morgan Kaufmann Publishers, 2005 |z 0123116333 |z 9780123116338 |
912 | |a ZDB-4-ITC | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-030735356 |
Datensatz im Suchindex
_version_ | 1804179171951247360 |
---|---|
any_adam_object | |
author | Harrington, Jan L. |
author_facet | Harrington, Jan L. |
author_role | aut |
author_sort | Harrington, Jan L. |
author_variant | j l h jl jlh |
building | Verbundindex |
bvnumber | BV045348701 |
collection | ZDB-4-ITC |
contents | Network Security is a comprehensive resource written for anyone who plans or implements network security measures, including managers and practitioners. It offers a valuable dual perspective on security: how your network looks to hackers who want to get inside, and how you need to approach it on the inside to keep them at bay. You get all the hands-on technical advice you need to succeed, but also higher-level administrative guidance for developing an effective security policy. There may be no such thing as absolute security, but, as the author clearly demonstrates, there is a huge difference between the protection offered by routine reliance on third-party products and what you can achieve by actively making informed decisions. Youll learn to do just that with this books assessments of the risks, rewards, and trade-offs related implementing security measures. + Helps you see through a hacker's eyes so you can make your network more secure. + Provides technical advice that can be applied in any environment, on any platform, including help with intrusion detection systems, firewalls, encryption, anti-virus software, and digital certificates. + Emphasizes a wide range of administrative considerations, including security policies, user management, and control of services and devices. + Covers techniques for enhancing the physical security of your systems and network. + Explains how hackers use information-gathering to find and exploit security flaws. + Examines the most effective ways to prevent hackers from gaining root access to a server. + Addresses Denial of Service attacks, "malware," and spoofing. + Includes appendices covering the TCP/IP protocol stack, well-known ports, and reliable sources for security warnings and updates |
ctrlnum | (ZDB-4-ITC)ocn162129994 (OCoLC)162129994 (DE-599)BVBBV045348701 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03407nmm a2200445zc 4500</leader><controlfield tag="001">BV045348701</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">181210s2005 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780123116338</subfield><subfield code="9">978-0-12-311633-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0123116333</subfield><subfield code="9">0-12-311633-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080455379</subfield><subfield code="9">0-08-045537-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080455372</subfield><subfield code="9">978-0-08-045537-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-4-ITC)ocn162129994</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)162129994</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV045348701</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Harrington, Jan L.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Network security</subfield><subfield code="b">a practical approach</subfield><subfield code="c">Jan L. Harrington</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Amsterdam ; Boston</subfield><subfield code="b">Elsevier</subfield><subfield code="b">Morgan Kaufmann Publishers</subfield><subfield code="c">2005</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xv, 365 pages)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Print version record</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Network Security is a comprehensive resource written for anyone who plans or implements network security measures, including managers and practitioners. It offers a valuable dual perspective on security: how your network looks to hackers who want to get inside, and how you need to approach it on the inside to keep them at bay. You get all the hands-on technical advice you need to succeed, but also higher-level administrative guidance for developing an effective security policy. There may be no such thing as absolute security, but, as the author clearly demonstrates, there is a huge difference between the protection offered by routine reliance on third-party products and what you can achieve by actively making informed decisions. Youll learn to do just that with this books assessments of the risks, rewards, and trade-offs related implementing security measures. + Helps you see through a hacker's eyes so you can make your network more secure. + Provides technical advice that can be applied in any environment, on any platform, including help with intrusion detection systems, firewalls, encryption, anti-virus software, and digital certificates. + Emphasizes a wide range of administrative considerations, including security policies, user management, and control of services and devices. + Covers techniques for enhancing the physical security of your systems and network. + Explains how hackers use information-gathering to find and exploit security flaws. + Examines the most effective ways to prevent hackers from gaining root access to a server. + Addresses Denial of Service attacks, "malware," and spoofing. + Includes appendices covering the TCP/IP protocol stack, well-known ports, and reliable sources for security warnings and updates</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Reseaux d'ordinateurs / Securite / Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computernetwerken</subfield><subfield code="2">gtt</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computerbeveiliging</subfield><subfield code="2">gtt</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="a">Harrington, Jan L.</subfield><subfield code="t">Network security</subfield><subfield code="d">Amsterdam ; Boston : Elsevier : Morgan Kaufmann Publishers, 2005</subfield><subfield code="z">0123116333</subfield><subfield code="z">9780123116338</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-ITC</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030735356</subfield></datafield></record></collection> |
id | DE-604.BV045348701 |
illustrated | Illustrated |
indexdate | 2024-07-10T08:15:38Z |
institution | BVB |
isbn | 9780123116338 0123116333 0080455379 9780080455372 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-030735356 |
oclc_num | 162129994 |
open_access_boolean | |
physical | 1 online resource (xv, 365 pages) illustrations |
psigel | ZDB-4-ITC |
publishDate | 2005 |
publishDateSearch | 2005 |
publishDateSort | 2005 |
publisher | Elsevier Morgan Kaufmann Publishers |
record_format | marc |
spelling | Harrington, Jan L. Verfasser aut Network security a practical approach Jan L. Harrington Amsterdam ; Boston Elsevier Morgan Kaufmann Publishers 2005 1 online resource (xv, 365 pages) illustrations txt rdacontent c rdamedia cr rdacarrier Print version record Network Security is a comprehensive resource written for anyone who plans or implements network security measures, including managers and practitioners. It offers a valuable dual perspective on security: how your network looks to hackers who want to get inside, and how you need to approach it on the inside to keep them at bay. You get all the hands-on technical advice you need to succeed, but also higher-level administrative guidance for developing an effective security policy. There may be no such thing as absolute security, but, as the author clearly demonstrates, there is a huge difference between the protection offered by routine reliance on third-party products and what you can achieve by actively making informed decisions. Youll learn to do just that with this books assessments of the risks, rewards, and trade-offs related implementing security measures. + Helps you see through a hacker's eyes so you can make your network more secure. + Provides technical advice that can be applied in any environment, on any platform, including help with intrusion detection systems, firewalls, encryption, anti-virus software, and digital certificates. + Emphasizes a wide range of administrative considerations, including security policies, user management, and control of services and devices. + Covers techniques for enhancing the physical security of your systems and network. + Explains how hackers use information-gathering to find and exploit security flaws. + Examines the most effective ways to prevent hackers from gaining root access to a server. + Addresses Denial of Service attacks, "malware," and spoofing. + Includes appendices covering the TCP/IP protocol stack, well-known ports, and reliable sources for security warnings and updates Reseaux d'ordinateurs / Securite / Mesures COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Computernetwerken gtt Computerbeveiliging gtt Computer networks Security measures Erscheint auch als Druck-Ausgabe Harrington, Jan L. Network security Amsterdam ; Boston : Elsevier : Morgan Kaufmann Publishers, 2005 0123116333 9780123116338 |
spellingShingle | Harrington, Jan L. Network security a practical approach Network Security is a comprehensive resource written for anyone who plans or implements network security measures, including managers and practitioners. It offers a valuable dual perspective on security: how your network looks to hackers who want to get inside, and how you need to approach it on the inside to keep them at bay. You get all the hands-on technical advice you need to succeed, but also higher-level administrative guidance for developing an effective security policy. There may be no such thing as absolute security, but, as the author clearly demonstrates, there is a huge difference between the protection offered by routine reliance on third-party products and what you can achieve by actively making informed decisions. Youll learn to do just that with this books assessments of the risks, rewards, and trade-offs related implementing security measures. + Helps you see through a hacker's eyes so you can make your network more secure. + Provides technical advice that can be applied in any environment, on any platform, including help with intrusion detection systems, firewalls, encryption, anti-virus software, and digital certificates. + Emphasizes a wide range of administrative considerations, including security policies, user management, and control of services and devices. + Covers techniques for enhancing the physical security of your systems and network. + Explains how hackers use information-gathering to find and exploit security flaws. + Examines the most effective ways to prevent hackers from gaining root access to a server. + Addresses Denial of Service attacks, "malware," and spoofing. + Includes appendices covering the TCP/IP protocol stack, well-known ports, and reliable sources for security warnings and updates Reseaux d'ordinateurs / Securite / Mesures COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Computernetwerken gtt Computerbeveiliging gtt Computer networks Security measures |
title | Network security a practical approach |
title_auth | Network security a practical approach |
title_exact_search | Network security a practical approach |
title_full | Network security a practical approach Jan L. Harrington |
title_fullStr | Network security a practical approach Jan L. Harrington |
title_full_unstemmed | Network security a practical approach Jan L. Harrington |
title_short | Network security |
title_sort | network security a practical approach |
title_sub | a practical approach |
topic | Reseaux d'ordinateurs / Securite / Mesures COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Computernetwerken gtt Computerbeveiliging gtt Computer networks Security measures |
topic_facet | Reseaux d'ordinateurs / Securite / Mesures COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General Computer networks / Security measures Computernetwerken Computerbeveiliging Computer networks Security measures |
work_keys_str_mv | AT harringtonjanl networksecurityapracticalapproach |