Security sage's guide to hardening the network infrastructure /:
Security Sage's Guide to Hardening the Network Infrastructure focuses on both perimeter and internal networks, giving IT and security administrators a complete picture of how they should design and protect their enterprises. Other books may concentrate on perimeter security or host configuratio...
Gespeichert in:
Weitere Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Rockland, MA :
Syngress Pub.,
©2004.
©2004 |
Schlagworte: | |
Online-Zugang: | Volltext Volltext |
Zusammenfassung: | Security Sage's Guide to Hardening the Network Infrastructure focuses on both perimeter and internal networks, giving IT and security administrators a complete picture of how they should design and protect their enterprises. Other books may concentrate on perimeter security or host configuration yet ignore the infrastructure connecting the two. While others tend to focus on theory and basic security background, this publication will dive right into the content and help provide real solutions to common IT security problems. |
Beschreibung: | Title from e-book title screen (viewed Apr 20, 2004). |
Beschreibung: | 1 online resource |
ISBN: | 1931836337 9781931836333 9781931836012 1931836019 0080480837 9780080480831 1281052620 9781281052629 |
Internformat
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocm54985361 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 040420s2004 mau o 000 0 eng d | ||
040 | |a N$T |b eng |e pn |c N$T |d OCLCQ |d B24X7 |d OCLCQ |d EBLCP |d MERUC |d OPELS |d CCO |d E7B |d VVN |d NTG |d BMU |d YDXCP |d IDEBK |d NRU |d DKDLA |d ZCU |d OCLCO |d FVL |d OCLCF |d OCLCQ |d UKDOC |d OCLCQ |d DEBSZ |d UMI |d OCLCQ |d KSU |d AZK |d LOA |d DEBBG |d AGLDB |d MOR |d PLS |d PIFBR |d LIV |d OCLCQ |d SAV |d U3W |d STF |d BRL |d WRM |d D6H |d OCLCQ |d VTS |d CEF |d NRAMU |d CRU |d ICG |d OCLCQ |d INT |d VT2 |d OCLCQ |d COO |d WYU |d G3B |d TKN |d OCLCQ |d LEAUB |d DKC |d OCLCQ |d OL$ |d OCLCQ |d K6U |d INARC |d OCLCO |d OCLCQ |d OCLCO |d OCLCL |d SXB |d OCLCQ | ||
019 | |a 56072878 |a 62476277 |a 85840953 |a 162598560 |a 191035011 |a 478247356 |a 507548152 |a 559259650 |a 647322564 |a 722222974 |a 728014400 |a 823829670 |a 823899375 |a 824090648 |a 824138261 |a 856952157 |a 888488562 |a 933930936 |a 961523284 |a 962657310 |a 1037490309 |a 1055366890 |a 1081252292 |a 1152983399 |a 1228586692 | ||
020 | |a 1931836337 |q (electronic bk.) | ||
020 | |a 9781931836333 |q (electronic bk.) | ||
020 | |a 9781931836012 | ||
020 | |a 1931836019 | ||
020 | |a 0080480837 | ||
020 | |a 9780080480831 | ||
020 | |a 1281052620 | ||
020 | |a 9781281052629 | ||
024 | 3 | |a 9781931836012 | |
035 | |a (OCoLC)54985361 |z (OCoLC)56072878 |z (OCoLC)62476277 |z (OCoLC)85840953 |z (OCoLC)162598560 |z (OCoLC)191035011 |z (OCoLC)478247356 |z (OCoLC)507548152 |z (OCoLC)559259650 |z (OCoLC)647322564 |z (OCoLC)722222974 |z (OCoLC)728014400 |z (OCoLC)823829670 |z (OCoLC)823899375 |z (OCoLC)824090648 |z (OCoLC)824138261 |z (OCoLC)856952157 |z (OCoLC)888488562 |z (OCoLC)933930936 |z (OCoLC)961523284 |z (OCoLC)962657310 |z (OCoLC)1037490309 |z (OCoLC)1055366890 |z (OCoLC)1081252292 |z (OCoLC)1152983399 |z (OCoLC)1228586692 | ||
037 | |b 00991439 | ||
050 | 4 | |a TK5105.59 |b S43 2004eb | |
072 | 7 | |a COM |x 060040 |2 bisacsh | |
072 | 7 | |a COM |x 043050 |2 bisacsh | |
072 | 7 | |a COM |x 053000 |2 bisacsh | |
072 | 7 | |a UTN |2 bicssc | |
082 | 7 | |a 005.8 |2 22 | |
049 | |a MAIN | ||
245 | 0 | 0 | |a Security sage's guide to hardening the network infrastructure / |c Steven Andrés [and others] ; foreword by Erik Pace Birkholz. |
246 | 3 | 0 | |a Hardening the network infrastructure |
260 | |a Rockland, MA : |b Syngress Pub., |c ©2004. | ||
264 | 4 | |c ©2004 | |
300 | |a 1 online resource | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a data file | ||
500 | |a Title from e-book title screen (viewed Apr 20, 2004). | ||
505 | 0 | |a Cover; Contents; Foreword; Defining Perimeter and Internal Segments; Assessing Your Current Networks; Selecting the Correct Firewall; Firewall Manipulation: Attacks and Defenses; Routing Devices and Protocols; Secure Network Management; Network Switching; Defending Routers and Switches; Implementing Intrusion Detection Systems; Perimeter Network Design; Internal Network Design; Index; Related Titles. | |
520 | |a Security Sage's Guide to Hardening the Network Infrastructure focuses on both perimeter and internal networks, giving IT and security administrators a complete picture of how they should design and protect their enterprises. Other books may concentrate on perimeter security or host configuration yet ignore the infrastructure connecting the two. While others tend to focus on theory and basic security background, this publication will dive right into the content and help provide real solutions to common IT security problems. | ||
650 | 0 | |a Computer networks |x Security measures. |0 http://id.loc.gov/authorities/subjects/sh94001277 | |
650 | 6 | |a Réseaux d'ordinateurs |x Sécurité |x Mesures. | |
650 | 7 | |a COMPUTERS |x Internet |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Networking |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh | |
650 | 7 | |a Computer networks |x Security measures |2 fast | |
700 | 1 | |a Andrés, Steven. | |
758 | |i has work: |a Security Sage's guide to hardening the network infrastructure (Text) |1 https://id.oclc.org/worldcat/entity/E39PCFVgm6ypkwq3PRQCYDJDmd |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Andrés, Steven. |t Security Sage's guide to hardening the network infrastructure. |d Rockland, MA : Syngress, ©2004 |z 9781931836012 |w (OCoLC)55522053 |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://www.sciencedirect.com/science/book/9781931836012 |3 Volltext |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=107438 |3 Volltext |
938 | |a 123Library |b 123L |n 36349 | ||
938 | |a Books 24x7 |b B247 |n bks00003721 | ||
938 | |a ProQuest Ebook Central |b EBLB |n EBL294359 | ||
938 | |a EBSCOhost |b EBSC |n 107438 | ||
938 | |a Internet Archive |b INAR |n securitysagesgui0000unse | ||
938 | |a YBP Library Services |b YANK |n 2613363 | ||
938 | |a YBP Library Services |b YANK |n 2361827 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocm54985361 |
---|---|
_version_ | 1816881615063744512 |
adam_text | |
any_adam_object | |
author2 | Andrés, Steven |
author2_role | |
author2_variant | s a sa |
author_facet | Andrés, Steven |
author_sort | Andrés, Steven |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | T - Technology |
callnumber-label | TK5105 |
callnumber-raw | TK5105.59 S43 2004eb |
callnumber-search | TK5105.59 S43 2004eb |
callnumber-sort | TK 45105.59 S43 42004EB |
callnumber-subject | TK - Electrical and Nuclear Engineering |
collection | ZDB-4-EBA |
contents | Cover; Contents; Foreword; Defining Perimeter and Internal Segments; Assessing Your Current Networks; Selecting the Correct Firewall; Firewall Manipulation: Attacks and Defenses; Routing Devices and Protocols; Secure Network Management; Network Switching; Defending Routers and Switches; Implementing Intrusion Detection Systems; Perimeter Network Design; Internal Network Design; Index; Related Titles. |
ctrlnum | (OCoLC)54985361 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04835cam a2200709 a 4500</leader><controlfield tag="001">ZDB-4-EBA-ocm54985361 </controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cnu---unuuu</controlfield><controlfield tag="008">040420s2004 mau o 000 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">N$T</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">N$T</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">B24X7</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">EBLCP</subfield><subfield code="d">MERUC</subfield><subfield code="d">OPELS</subfield><subfield code="d">CCO</subfield><subfield code="d">E7B</subfield><subfield code="d">VVN</subfield><subfield code="d">NTG</subfield><subfield code="d">BMU</subfield><subfield code="d">YDXCP</subfield><subfield code="d">IDEBK</subfield><subfield code="d">NRU</subfield><subfield code="d">DKDLA</subfield><subfield code="d">ZCU</subfield><subfield code="d">OCLCO</subfield><subfield code="d">FVL</subfield><subfield code="d">OCLCF</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">UKDOC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">DEBSZ</subfield><subfield code="d">UMI</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">KSU</subfield><subfield code="d">AZK</subfield><subfield code="d">LOA</subfield><subfield code="d">DEBBG</subfield><subfield code="d">AGLDB</subfield><subfield code="d">MOR</subfield><subfield code="d">PLS</subfield><subfield code="d">PIFBR</subfield><subfield code="d">LIV</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">SAV</subfield><subfield code="d">U3W</subfield><subfield code="d">STF</subfield><subfield code="d">BRL</subfield><subfield code="d">WRM</subfield><subfield code="d">D6H</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">VTS</subfield><subfield code="d">CEF</subfield><subfield code="d">NRAMU</subfield><subfield code="d">CRU</subfield><subfield code="d">ICG</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">INT</subfield><subfield code="d">VT2</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">COO</subfield><subfield code="d">WYU</subfield><subfield code="d">G3B</subfield><subfield code="d">TKN</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">LEAUB</subfield><subfield code="d">DKC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OL$</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">K6U</subfield><subfield code="d">INARC</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield><subfield code="d">SXB</subfield><subfield code="d">OCLCQ</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">56072878</subfield><subfield code="a">62476277</subfield><subfield code="a">85840953</subfield><subfield code="a">162598560</subfield><subfield code="a">191035011</subfield><subfield code="a">478247356</subfield><subfield code="a">507548152</subfield><subfield code="a">559259650</subfield><subfield code="a">647322564</subfield><subfield code="a">722222974</subfield><subfield code="a">728014400</subfield><subfield code="a">823829670</subfield><subfield code="a">823899375</subfield><subfield code="a">824090648</subfield><subfield code="a">824138261</subfield><subfield code="a">856952157</subfield><subfield code="a">888488562</subfield><subfield code="a">933930936</subfield><subfield code="a">961523284</subfield><subfield code="a">962657310</subfield><subfield code="a">1037490309</subfield><subfield code="a">1055366890</subfield><subfield code="a">1081252292</subfield><subfield code="a">1152983399</subfield><subfield code="a">1228586692</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1931836337</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781931836333</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781931836012</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1931836019</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080480837</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080480831</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1281052620</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781281052629</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9781931836012</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)54985361</subfield><subfield code="z">(OCoLC)56072878</subfield><subfield code="z">(OCoLC)62476277</subfield><subfield code="z">(OCoLC)85840953</subfield><subfield code="z">(OCoLC)162598560</subfield><subfield code="z">(OCoLC)191035011</subfield><subfield code="z">(OCoLC)478247356</subfield><subfield code="z">(OCoLC)507548152</subfield><subfield code="z">(OCoLC)559259650</subfield><subfield code="z">(OCoLC)647322564</subfield><subfield code="z">(OCoLC)722222974</subfield><subfield code="z">(OCoLC)728014400</subfield><subfield code="z">(OCoLC)823829670</subfield><subfield code="z">(OCoLC)823899375</subfield><subfield code="z">(OCoLC)824090648</subfield><subfield code="z">(OCoLC)824138261</subfield><subfield code="z">(OCoLC)856952157</subfield><subfield code="z">(OCoLC)888488562</subfield><subfield code="z">(OCoLC)933930936</subfield><subfield code="z">(OCoLC)961523284</subfield><subfield code="z">(OCoLC)962657310</subfield><subfield code="z">(OCoLC)1037490309</subfield><subfield code="z">(OCoLC)1055366890</subfield><subfield code="z">(OCoLC)1081252292</subfield><subfield code="z">(OCoLC)1152983399</subfield><subfield code="z">(OCoLC)1228586692</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="b">00991439</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">TK5105.59</subfield><subfield code="b">S43 2004eb</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">060040</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">043050</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">053000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">UTN</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Security sage's guide to hardening the network infrastructure /</subfield><subfield code="c">Steven Andrés [and others] ; foreword by Erik Pace Birkholz.</subfield></datafield><datafield tag="246" ind1="3" ind2="0"><subfield code="a">Hardening the network infrastructure</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Rockland, MA :</subfield><subfield code="b">Syngress Pub.,</subfield><subfield code="c">©2004.</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2004</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">data file</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Title from e-book title screen (viewed Apr 20, 2004).</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Cover; Contents; Foreword; Defining Perimeter and Internal Segments; Assessing Your Current Networks; Selecting the Correct Firewall; Firewall Manipulation: Attacks and Defenses; Routing Devices and Protocols; Secure Network Management; Network Switching; Defending Routers and Switches; Implementing Intrusion Detection Systems; Perimeter Network Design; Internal Network Design; Index; Related Titles.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Security Sage's Guide to Hardening the Network Infrastructure focuses on both perimeter and internal networks, giving IT and security administrators a complete picture of how they should design and protect their enterprises. Other books may concentrate on perimeter security or host configuration yet ignore the infrastructure connecting the two. While others tend to focus on theory and basic security background, this publication will dive right into the content and help provide real solutions to common IT security problems.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh94001277</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Réseaux d'ordinateurs</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Internet</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Networking</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Security</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Andrés, Steven.</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Security Sage's guide to hardening the network infrastructure (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCFVgm6ypkwq3PRQCYDJDmd</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Andrés, Steven.</subfield><subfield code="t">Security Sage's guide to hardening the network infrastructure.</subfield><subfield code="d">Rockland, MA : Syngress, ©2004</subfield><subfield code="z">9781931836012</subfield><subfield code="w">(OCoLC)55522053</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://www.sciencedirect.com/science/book/9781931836012</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=107438</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">123Library</subfield><subfield code="b">123L</subfield><subfield code="n">36349</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Books 24x7</subfield><subfield code="b">B247</subfield><subfield code="n">bks00003721</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest Ebook Central</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL294359</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">107438</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Internet Archive</subfield><subfield code="b">INAR</subfield><subfield code="n">securitysagesgui0000unse</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">2613363</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">2361827</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-ocm54985361 |
illustrated | Not Illustrated |
indexdate | 2024-11-27T13:15:32Z |
institution | BVB |
isbn | 1931836337 9781931836333 9781931836012 1931836019 0080480837 9780080480831 1281052620 9781281052629 |
language | English |
oclc_num | 54985361 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource |
psigel | ZDB-4-EBA |
publishDate | 2004 |
publishDateSearch | 2004 |
publishDateSort | 2004 |
publisher | Syngress Pub., |
record_format | marc |
spelling | Security sage's guide to hardening the network infrastructure / Steven Andrés [and others] ; foreword by Erik Pace Birkholz. Hardening the network infrastructure Rockland, MA : Syngress Pub., ©2004. ©2004 1 online resource text txt rdacontent computer c rdamedia online resource cr rdacarrier data file Title from e-book title screen (viewed Apr 20, 2004). Cover; Contents; Foreword; Defining Perimeter and Internal Segments; Assessing Your Current Networks; Selecting the Correct Firewall; Firewall Manipulation: Attacks and Defenses; Routing Devices and Protocols; Secure Network Management; Network Switching; Defending Routers and Switches; Implementing Intrusion Detection Systems; Perimeter Network Design; Internal Network Design; Index; Related Titles. Security Sage's Guide to Hardening the Network Infrastructure focuses on both perimeter and internal networks, giving IT and security administrators a complete picture of how they should design and protect their enterprises. Other books may concentrate on perimeter security or host configuration yet ignore the infrastructure connecting the two. While others tend to focus on theory and basic security background, this publication will dive right into the content and help provide real solutions to common IT security problems. Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Réseaux d'ordinateurs Sécurité Mesures. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer networks Security measures fast Andrés, Steven. has work: Security Sage's guide to hardening the network infrastructure (Text) https://id.oclc.org/worldcat/entity/E39PCFVgm6ypkwq3PRQCYDJDmd https://id.oclc.org/worldcat/ontology/hasWork Print version: Andrés, Steven. Security Sage's guide to hardening the network infrastructure. Rockland, MA : Syngress, ©2004 9781931836012 (OCoLC)55522053 FWS01 ZDB-4-EBA FWS_PDA_EBA https://www.sciencedirect.com/science/book/9781931836012 Volltext FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=107438 Volltext |
spellingShingle | Security sage's guide to hardening the network infrastructure / Cover; Contents; Foreword; Defining Perimeter and Internal Segments; Assessing Your Current Networks; Selecting the Correct Firewall; Firewall Manipulation: Attacks and Defenses; Routing Devices and Protocols; Secure Network Management; Network Switching; Defending Routers and Switches; Implementing Intrusion Detection Systems; Perimeter Network Design; Internal Network Design; Index; Related Titles. Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Réseaux d'ordinateurs Sécurité Mesures. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer networks Security measures fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh94001277 |
title | Security sage's guide to hardening the network infrastructure / |
title_alt | Hardening the network infrastructure |
title_auth | Security sage's guide to hardening the network infrastructure / |
title_exact_search | Security sage's guide to hardening the network infrastructure / |
title_full | Security sage's guide to hardening the network infrastructure / Steven Andrés [and others] ; foreword by Erik Pace Birkholz. |
title_fullStr | Security sage's guide to hardening the network infrastructure / Steven Andrés [and others] ; foreword by Erik Pace Birkholz. |
title_full_unstemmed | Security sage's guide to hardening the network infrastructure / Steven Andrés [and others] ; foreword by Erik Pace Birkholz. |
title_short | Security sage's guide to hardening the network infrastructure / |
title_sort | security sage s guide to hardening the network infrastructure |
topic | Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Réseaux d'ordinateurs Sécurité Mesures. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer networks Security measures fast |
topic_facet | Computer networks Security measures. Réseaux d'ordinateurs Sécurité Mesures. COMPUTERS Internet Security. COMPUTERS Networking Security. COMPUTERS Security General. Computer networks Security measures |
url | https://www.sciencedirect.com/science/book/9781931836012 https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=107438 |
work_keys_str_mv | AT andressteven securitysagesguidetohardeningthenetworkinfrastructure AT andressteven hardeningthenetworkinfrastructure |