Hack proofing Windows 2000:
The complete, authoritative guide to protecting your Windows 2000 Network "Essential reading for your IT security organization."--Deena Joyce, Director of Information Technology and Network Security, Casino Magic Pick up a newspaper or watch the evening news and you will find a major news...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Rockland, MA
Syngress
© 2001
|
Schriftenreihe: | ITpro collection
|
Schlagworte: | |
Online-Zugang: | FLA01 URL des Erstveröffentlichers |
Zusammenfassung: | The complete, authoritative guide to protecting your Windows 2000 Network "Essential reading for your IT security organization."--Deena Joyce, Director of Information Technology and Network Security, Casino Magic Pick up a newspaper or watch the evening news and you will find a major news story involving a breech of network security. Windows 2000, as the premier network platform, has many important security features but they are difficult to configure and manage. Hack Proofing Windows 2000 Server has totally up-to-date coverage of Service Pack 2 (SP2), Kerberos and Public Key Infrastructure and also addresses newer topics such as Virtual Private Networks (VPNs), remote access and web site security. The book also has complete coverage of Internet Information Server (IIS) release 5. A great addition to the bestselling "Hack Proofing ..." series Windows 2000 sales have surpassed those of Windows NT Critical topic. The security of an organization's data and communications is crucial to its survival and these topics are notoriously difficult to grasp Unrivalled web support at www.solutions@syngress.com |
Beschreibung: | Includes index Paralleltitel: Hack proofing Windows 2000 server |
Beschreibung: | 1 online resource (xxv, 693 pages) illustrations |
ISBN: | 1932266151 9781932266153 9781931836494 1931836493 9780080478142 008047814X |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV046124544 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 190827s2001 |||| o||u| ||||||eng d | ||
020 | |a 1932266151 |9 1-932266-15-1 | ||
020 | |a 9781932266153 |9 978-1-932266-15-3 | ||
020 | |a 9781931836494 |9 978-1-931836-49-4 | ||
020 | |a 1931836493 |9 1-931836-49-3 | ||
020 | |a 9780080478142 |9 978-0-08-047814-2 | ||
020 | |a 008047814X |9 0-08-047814-X | ||
035 | |a (ZDB-33-ESD)ocm51563418 | ||
035 | |a (OCoLC)51563418 | ||
035 | |a (DE-599)BVBBV046124544 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 005.8 |2 21 | |
100 | 1 | |a Todd, Chad |e Verfasser |4 aut | |
245 | 1 | 0 | |a Hack proofing Windows 2000 |c Chad Todd ; Norris L. Johnson, Jr., technical editor |
246 | 1 | 3 | |a Hack proofing Windows 2000 server |
264 | 1 | |a Rockland, MA |b Syngress |c © 2001 | |
300 | |a 1 online resource (xxv, 693 pages) |b illustrations | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a ITpro collection | |
500 | |a Includes index | ||
500 | |a Paralleltitel: Hack proofing Windows 2000 server | ||
520 | |a The complete, authoritative guide to protecting your Windows 2000 Network "Essential reading for your IT security organization."--Deena Joyce, Director of Information Technology and Network Security, Casino Magic Pick up a newspaper or watch the evening news and you will find a major news story involving a breech of network security. Windows 2000, as the premier network platform, has many important security features but they are difficult to configure and manage. Hack Proofing Windows 2000 Server has totally up-to-date coverage of Service Pack 2 (SP2), Kerberos and Public Key Infrastructure and also addresses newer topics such as Virtual Private Networks (VPNs), remote access and web site security. The book also has complete coverage of Internet Information Server (IIS) release 5. A great addition to the bestselling "Hack Proofing ..." series Windows 2000 sales have surpassed those of Windows NT Critical topic. The security of an organization's data and communications is crucial to its survival and these topics are notoriously difficult to grasp Unrivalled web support at www.solutions@syngress.com | ||
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a Computer networks / Security measures |2 fast | |
650 | 7 | |a Computer security |2 fast | |
650 | 4 | |a Computer security | |
650 | 4 | |a Computer networks |x Security measures | |
700 | 1 | |a Johnson, Norris L. |e Sonstige |4 oth | |
856 | 4 | 0 | |u http://www.sciencedirect.com/science/book/9781931836494 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-33-ESD | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-031504998 | ||
347 | |a data file |2 rda | ||
966 | e | |u http://www.sciencedirect.com/science/book/9781931836494 |l FLA01 |p ZDB-33-ESD |q FLA_PDA_ESD |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804180442680655872 |
---|---|
any_adam_object | |
author | Todd, Chad |
author_facet | Todd, Chad |
author_role | aut |
author_sort | Todd, Chad |
author_variant | c t ct |
building | Verbundindex |
bvnumber | BV046124544 |
collection | ZDB-33-ESD |
ctrlnum | (ZDB-33-ESD)ocm51563418 (OCoLC)51563418 (DE-599)BVBBV046124544 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03059nmm a2200529zc 4500</leader><controlfield tag="001">BV046124544</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">190827s2001 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1932266151</subfield><subfield code="9">1-932266-15-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781932266153</subfield><subfield code="9">978-1-932266-15-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781931836494</subfield><subfield code="9">978-1-931836-49-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1931836493</subfield><subfield code="9">1-931836-49-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080478142</subfield><subfield code="9">978-0-08-047814-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">008047814X</subfield><subfield code="9">0-08-047814-X</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-33-ESD)ocm51563418</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)51563418</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046124544</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">21</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Todd, Chad</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Hack proofing Windows 2000</subfield><subfield code="c">Chad Todd ; Norris L. Johnson, Jr., technical editor</subfield></datafield><datafield tag="246" ind1="1" ind2="3"><subfield code="a">Hack proofing Windows 2000 server</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Rockland, MA</subfield><subfield code="b">Syngress</subfield><subfield code="c">© 2001</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xxv, 693 pages)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">ITpro collection</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Paralleltitel: Hack proofing Windows 2000 server</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">The complete, authoritative guide to protecting your Windows 2000 Network "Essential reading for your IT security organization."--Deena Joyce, Director of Information Technology and Network Security, Casino Magic Pick up a newspaper or watch the evening news and you will find a major news story involving a breech of network security. Windows 2000, as the premier network platform, has many important security features but they are difficult to configure and manage. Hack Proofing Windows 2000 Server has totally up-to-date coverage of Service Pack 2 (SP2), Kerberos and Public Key Infrastructure and also addresses newer topics such as Virtual Private Networks (VPNs), remote access and web site security. The book also has complete coverage of Internet Information Server (IIS) release 5. A great addition to the bestselling "Hack Proofing ..." series Windows 2000 sales have surpassed those of Windows NT Critical topic. The security of an organization's data and communications is crucial to its survival and these topics are notoriously difficult to grasp Unrivalled web support at www.solutions@syngress.com</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Johnson, Norris L.</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9781931836494</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-031504998</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">data file</subfield><subfield code="2">rda</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.sciencedirect.com/science/book/9781931836494</subfield><subfield code="l">FLA01</subfield><subfield code="p">ZDB-33-ESD</subfield><subfield code="q">FLA_PDA_ESD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV046124544 |
illustrated | Illustrated |
indexdate | 2024-07-10T08:35:50Z |
institution | BVB |
isbn | 1932266151 9781932266153 9781931836494 1931836493 9780080478142 008047814X |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-031504998 |
oclc_num | 51563418 |
open_access_boolean | |
physical | 1 online resource (xxv, 693 pages) illustrations |
psigel | ZDB-33-ESD ZDB-33-ESD FLA_PDA_ESD |
publishDate | 2001 |
publishDateSearch | 2001 |
publishDateSort | 2001 |
publisher | Syngress |
record_format | marc |
series2 | ITpro collection |
spelling | Todd, Chad Verfasser aut Hack proofing Windows 2000 Chad Todd ; Norris L. Johnson, Jr., technical editor Hack proofing Windows 2000 server Rockland, MA Syngress © 2001 1 online resource (xxv, 693 pages) illustrations txt rdacontent c rdamedia cr rdacarrier ITpro collection Includes index Paralleltitel: Hack proofing Windows 2000 server The complete, authoritative guide to protecting your Windows 2000 Network "Essential reading for your IT security organization."--Deena Joyce, Director of Information Technology and Network Security, Casino Magic Pick up a newspaper or watch the evening news and you will find a major news story involving a breech of network security. Windows 2000, as the premier network platform, has many important security features but they are difficult to configure and manage. Hack Proofing Windows 2000 Server has totally up-to-date coverage of Service Pack 2 (SP2), Kerberos and Public Key Infrastructure and also addresses newer topics such as Virtual Private Networks (VPNs), remote access and web site security. The book also has complete coverage of Internet Information Server (IIS) release 5. A great addition to the bestselling "Hack Proofing ..." series Windows 2000 sales have surpassed those of Windows NT Critical topic. The security of an organization's data and communications is crucial to its survival and these topics are notoriously difficult to grasp Unrivalled web support at www.solutions@syngress.com COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Computer security fast Computer security Computer networks Security measures Johnson, Norris L. Sonstige oth http://www.sciencedirect.com/science/book/9781931836494 Verlag URL des Erstveröffentlichers Volltext data file rda |
spellingShingle | Todd, Chad Hack proofing Windows 2000 COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Computer security fast Computer security Computer networks Security measures |
title | Hack proofing Windows 2000 |
title_alt | Hack proofing Windows 2000 server |
title_auth | Hack proofing Windows 2000 |
title_exact_search | Hack proofing Windows 2000 |
title_full | Hack proofing Windows 2000 Chad Todd ; Norris L. Johnson, Jr., technical editor |
title_fullStr | Hack proofing Windows 2000 Chad Todd ; Norris L. Johnson, Jr., technical editor |
title_full_unstemmed | Hack proofing Windows 2000 Chad Todd ; Norris L. Johnson, Jr., technical editor |
title_short | Hack proofing Windows 2000 |
title_sort | hack proofing windows 2000 |
topic | COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Computer security fast Computer security Computer networks Security measures |
topic_facet | COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General Computer networks / Security measures Computer security Computer networks Security measures |
url | http://www.sciencedirect.com/science/book/9781931836494 |
work_keys_str_mv | AT toddchad hackproofingwindows2000 AT johnsonnorrisl hackproofingwindows2000 AT toddchad hackproofingwindows2000server AT johnsonnorrisl hackproofingwindows2000server |