Internet security: a jumpstart for systems administrators and IT managers
Internet Security incorporates not only the technology needed to support a solid security strategy but also those policies and processes that must be incorporated in order for that strategy to work. New methods of breaking into corporate networks are resulting in major losses. This book provides the...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Amsterdam Boston
Digital Press
© 2003
|
Schlagworte: | |
Online-Zugang: | FLA01 Volltext |
Zusammenfassung: | Internet Security incorporates not only the technology needed to support a solid security strategy but also those policies and processes that must be incorporated in order for that strategy to work. New methods of breaking into corporate networks are resulting in major losses. This book provides the latest information on how to guard against attacks and informs the IT manager of the products that can detect and prevent break-ins. Crucial concepts such as authentication and encryption are explained, enabling the reader to understand when and where these technologies will be useful. Due to the a |
Beschreibung: | Includes bibliographical references (pages 321-389) and index |
Beschreibung: | 1 online resource (xviii, 398 pages) illustrations |
ISBN: | 9780080509075 008050907X 9781555582982 1555582982 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV046124293 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 190827s2003 |||| o||u| ||||||eng d | ||
015 | |a GBA3X3731 |2 dnb | ||
020 | |a 9780080509075 |9 978-0-08-050907-5 | ||
020 | |a 008050907X |9 0-08-050907-X | ||
020 | |a 9781555582982 |9 978-1-55558-298-2 | ||
020 | |a 1555582982 |9 1-55558-298-2 | ||
035 | |a (ZDB-33-ESD)ocn174142945 | ||
035 | |a (OCoLC)174142945 | ||
035 | |a (DE-599)BVBBV046124293 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 005.8 |2 22 | |
100 | 1 | |a Speed, Tim |e Verfasser |4 aut | |
245 | 1 | 0 | |a Internet security |b a jumpstart for systems administrators and IT managers |c Tim Speed, Juanita Ellis |
264 | 1 | |a Amsterdam |a Boston |b Digital Press |c © 2003 | |
300 | |a 1 online resource (xviii, 398 pages) |b illustrations | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references (pages 321-389) and index | ||
520 | |a Internet Security incorporates not only the technology needed to support a solid security strategy but also those policies and processes that must be incorporated in order for that strategy to work. New methods of breaking into corporate networks are resulting in major losses. This book provides the latest information on how to guard against attacks and informs the IT manager of the products that can detect and prevent break-ins. Crucial concepts such as authentication and encryption are explained, enabling the reader to understand when and where these technologies will be useful. Due to the a | ||
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a Computer networks / Security measures |2 fast | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Internet / Security measures |2 fast | |
650 | 4 | |a Internet |x Security measures | |
650 | 4 | |a Computer networks |x Security measures | |
650 | 4 | |a Computer security | |
700 | 1 | |a Ellis, Juanita |e Sonstige |4 oth | |
856 | 4 | 0 | |u http://www.sciencedirect.com/science/book/9781555582982 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-33-ESD | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-031504747 | ||
966 | e | |u http://www.sciencedirect.com/science/book/9781555582982 |l FLA01 |p ZDB-33-ESD |q FLA_PDA_ESD |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804180442150076416 |
---|---|
any_adam_object | |
author | Speed, Tim |
author_facet | Speed, Tim |
author_role | aut |
author_sort | Speed, Tim |
author_variant | t s ts |
building | Verbundindex |
bvnumber | BV046124293 |
collection | ZDB-33-ESD |
ctrlnum | (ZDB-33-ESD)ocn174142945 (OCoLC)174142945 (DE-599)BVBBV046124293 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02477nmm a2200493zc 4500</leader><controlfield tag="001">BV046124293</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">190827s2003 |||| o||u| ||||||eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">GBA3X3731</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080509075</subfield><subfield code="9">978-0-08-050907-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">008050907X</subfield><subfield code="9">0-08-050907-X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781555582982</subfield><subfield code="9">978-1-55558-298-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1555582982</subfield><subfield code="9">1-55558-298-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-33-ESD)ocn174142945</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)174142945</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046124293</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Speed, Tim</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Internet security</subfield><subfield code="b">a jumpstart for systems administrators and IT managers</subfield><subfield code="c">Tim Speed, Juanita Ellis</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Amsterdam</subfield><subfield code="a">Boston</subfield><subfield code="b">Digital Press</subfield><subfield code="c">© 2003</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xviii, 398 pages)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references (pages 321-389) and index</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Internet Security incorporates not only the technology needed to support a solid security strategy but also those policies and processes that must be incorporated in order for that strategy to work. New methods of breaking into corporate networks are resulting in major losses. This book provides the latest information on how to guard against attacks and informs the IT manager of the products that can detect and prevent break-ins. Crucial concepts such as authentication and encryption are explained, enabling the reader to understand when and where these technologies will be useful. Due to the a</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Internet / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ellis, Juanita</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9781555582982</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-031504747</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.sciencedirect.com/science/book/9781555582982</subfield><subfield code="l">FLA01</subfield><subfield code="p">ZDB-33-ESD</subfield><subfield code="q">FLA_PDA_ESD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV046124293 |
illustrated | Illustrated |
indexdate | 2024-07-10T08:35:49Z |
institution | BVB |
isbn | 9780080509075 008050907X 9781555582982 1555582982 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-031504747 |
oclc_num | 174142945 |
open_access_boolean | |
physical | 1 online resource (xviii, 398 pages) illustrations |
psigel | ZDB-33-ESD ZDB-33-ESD FLA_PDA_ESD |
publishDate | 2003 |
publishDateSearch | 2003 |
publishDateSort | 2003 |
publisher | Digital Press |
record_format | marc |
spelling | Speed, Tim Verfasser aut Internet security a jumpstart for systems administrators and IT managers Tim Speed, Juanita Ellis Amsterdam Boston Digital Press © 2003 1 online resource (xviii, 398 pages) illustrations txt rdacontent c rdamedia cr rdacarrier Includes bibliographical references (pages 321-389) and index Internet Security incorporates not only the technology needed to support a solid security strategy but also those policies and processes that must be incorporated in order for that strategy to work. New methods of breaking into corporate networks are resulting in major losses. This book provides the latest information on how to guard against attacks and informs the IT manager of the products that can detect and prevent break-ins. Crucial concepts such as authentication and encryption are explained, enabling the reader to understand when and where these technologies will be useful. Due to the a COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Computer security fast Internet / Security measures fast Internet Security measures Computer networks Security measures Computer security Ellis, Juanita Sonstige oth http://www.sciencedirect.com/science/book/9781555582982 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Speed, Tim Internet security a jumpstart for systems administrators and IT managers COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Computer security fast Internet / Security measures fast Internet Security measures Computer networks Security measures Computer security |
title | Internet security a jumpstart for systems administrators and IT managers |
title_auth | Internet security a jumpstart for systems administrators and IT managers |
title_exact_search | Internet security a jumpstart for systems administrators and IT managers |
title_full | Internet security a jumpstart for systems administrators and IT managers Tim Speed, Juanita Ellis |
title_fullStr | Internet security a jumpstart for systems administrators and IT managers Tim Speed, Juanita Ellis |
title_full_unstemmed | Internet security a jumpstart for systems administrators and IT managers Tim Speed, Juanita Ellis |
title_short | Internet security |
title_sort | internet security a jumpstart for systems administrators and it managers |
title_sub | a jumpstart for systems administrators and IT managers |
topic | COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Computer security fast Internet / Security measures fast Internet Security measures Computer networks Security measures Computer security |
topic_facet | COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General Computer networks / Security measures Computer security Internet / Security measures Internet Security measures Computer networks Security measures |
url | http://www.sciencedirect.com/science/book/9781555582982 |
work_keys_str_mv | AT speedtim internetsecurityajumpstartforsystemsadministratorsanditmanagers AT ellisjuanita internetsecurityajumpstartforsystemsadministratorsanditmanagers |