Internet security :: a jumpstart for systems administrators and IT managers /
Internet Security incorporates not only the technology needed to support a solid security strategy but also those policies and processes that must be incorporated in order for that strategy to work. New methods of breaking into corporate networks are resulting in major losses. This book provides the...
Gespeichert in:
1. Verfasser: | |
---|---|
Weitere Verfasser: | |
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Amsterdam ; Boston :
Digital Press,
©2003.
|
Schlagworte: | |
Online-Zugang: | DE-862 DE-863 DE-862 DE-863 |
Zusammenfassung: | Internet Security incorporates not only the technology needed to support a solid security strategy but also those policies and processes that must be incorporated in order for that strategy to work. New methods of breaking into corporate networks are resulting in major losses. This book provides the latest information on how to guard against attacks and informs the IT manager of the products that can detect and prevent break-ins. Crucial concepts such as authentication and encryption are explained, enabling the reader to understand when and where these technologies will be useful. Due to the a. |
Beschreibung: | 1 online resource (xviii, 398 pages) : illustrations |
Bibliographie: | Includes bibliographical references (pages 321-389) and index. |
ISBN: | 9780080509075 008050907X 9781555582982 1555582982 1281039489 9781281039484 9786611039486 6611039481 |
Internformat
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocn174142945 | ||
003 | OCoLC | ||
005 | 20250103110447.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 071015s2003 ne a ob 001 0 eng d | ||
010 | |z 2003279708 | ||
040 | |a N$T |b eng |e pn |c N$T |d YDXCP |d BTCTA |d OCLCQ |d IDEBK |d OCLCQ |d MERUC |d OCLCQ |d OCLCO |d OCLCQ |d OCLCF |d NLGGC |d OCLCO |d OCLCQ |d OCLCO |d OPELS |d OKU |d OCLCQ |d AGLDB |d OCLCA |d STF |d D6H |d OCLCQ |d VTS |d CEF |d OCLCQ |d WYU |d LEAUB |d M8D |d INARC |d VLY |d VT2 |d OCLCO |d OCLCQ |d COA |d OCLCO |d OCLCL |d SXB |d OCLCQ | ||
015 | |a GBA3X3731 |2 bnb | ||
019 | |a 162595049 |a 173240136 |a 179819639 |a 1035659765 |a 1063815321 |a 1162288430 |a 1192345861 |a 1240532024 |a 1340085767 | ||
020 | |a 9780080509075 |q (electronic bk.) | ||
020 | |a 008050907X |q (electronic bk.) | ||
020 | |a 9781555582982 | ||
020 | |a 1555582982 | ||
020 | |a 1281039489 | ||
020 | |a 9781281039484 | ||
020 | |a 9786611039486 | ||
020 | |a 6611039481 | ||
024 | 8 | |a (WaSeSS)ssj0000181867 | |
035 | |a (OCoLC)174142945 |z (OCoLC)162595049 |z (OCoLC)173240136 |z (OCoLC)179819639 |z (OCoLC)1035659765 |z (OCoLC)1063815321 |z (OCoLC)1162288430 |z (OCoLC)1192345861 |z (OCoLC)1240532024 |z (OCoLC)1340085767 | ||
037 | |a 97722:97724 |b Elsevier Science & Technology |n http://www.sciencedirect.com | ||
050 | 4 | |a TK5105.59 |b .S64 2003eb | |
072 | 7 | |a COM |x 060040 |2 bisacsh | |
072 | 7 | |a COM |x 043050 |2 bisacsh | |
072 | 7 | |a COM |x 053000 |2 bisacsh | |
082 | 7 | |a 005.8 |2 22 | |
049 | |a MAIN | ||
100 | 1 | |a Speed, Tim. | |
245 | 1 | 0 | |a Internet security : |b a jumpstart for systems administrators and IT managers / |c Tim Speed, Juanita Ellis. |
260 | |a Amsterdam ; |a Boston : |b Digital Press, |c ©2003. | ||
300 | |a 1 online resource (xviii, 398 pages) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
504 | |a Includes bibliographical references (pages 321-389) and index. | ||
588 | 0 | |a Print version record. | |
505 | 0 | |a Front Cover; Internet Security: A Jumpstart for Systems Administrators and IT Managers; Copyright Page; Contents; Foreword; Acknowledgments; Introduction; Chapter 1. The Internet and Security; Chapter 2. The Security Review Process; Chapter 3. Cryptography; Chapter 4. Secure Networks; Chapter 5. Protecting Your Intranet from the Extranet and Internet; Chapter 6. Authentication and Authorization; Chapter 7. E-Commerce. Public Key Infrastructure; Chapter 8. Messaging Security; Chapter 9. What Are We Doing Here?; Chapter 10. Disaster Recovery; Appendix 1. Security Tools. | |
520 | |a Internet Security incorporates not only the technology needed to support a solid security strategy but also those policies and processes that must be incorporated in order for that strategy to work. New methods of breaking into corporate networks are resulting in major losses. This book provides the latest information on how to guard against attacks and informs the IT manager of the products that can detect and prevent break-ins. Crucial concepts such as authentication and encryption are explained, enabling the reader to understand when and where these technologies will be useful. Due to the a. | ||
546 | |a English. | ||
650 | 0 | |a Internet |x Security measures. | |
650 | 0 | |a Computer networks |x Security measures. |0 http://id.loc.gov/authorities/subjects/sh94001277 | |
650 | 0 | |a Computer security. | |
650 | 2 | |a Computer Security |0 https://id.nlm.nih.gov/mesh/D016494 | |
650 | 6 | |a Internet |x Sécurité |x Mesures. | |
650 | 6 | |a Réseaux d'ordinateurs |x Sécurité |x Mesures. | |
650 | 6 | |a Sécurité informatique. | |
650 | 7 | |a COMPUTERS |x Internet |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Networking |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh | |
650 | 7 | |a Computer networks |x Security measures |2 fast | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Internet |x Security measures |2 fast | |
700 | 1 | |a Ellis, Juanita. | |
758 | |i has work: |a Internet security (Text) |1 https://id.oclc.org/worldcat/entity/E39PCGWbG6wTrFdWYhw6XPMC6X |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Speed, Tim. |t Internet security. |d Amsterdam ; Boston : Digital Press, ©2003 |z 1555582982 |z 9781555582982 |w (DLC) 2003279708 |w (OCoLC)53896812 |
966 | 4 | 0 | |l DE-862 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=205744 |3 Volltext |
966 | 4 | 0 | |l DE-863 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=205744 |3 Volltext |
966 | 4 | 0 | |l DE-862 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://www.sciencedirect.com/science/book/9781555582982 |3 Volltext |
966 | 4 | 0 | |l DE-863 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://www.sciencedirect.com/science/book/9781555582982 |3 Volltext |
938 | |a Baker and Taylor |b BTCP |n BK0007500571 | ||
938 | |a EBSCOhost |b EBSC |n 205744 | ||
938 | |a Internet Archive |b INAR |n internetsecurity0000spee | ||
938 | |a YBP Library Services |b YANK |n 2636673 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-862 | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocn174142945 |
---|---|
_version_ | 1829094614346235904 |
adam_text | |
any_adam_object | |
author | Speed, Tim |
author2 | Ellis, Juanita |
author2_role | |
author2_variant | j e je |
author_facet | Speed, Tim Ellis, Juanita |
author_role | |
author_sort | Speed, Tim |
author_variant | t s ts |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | T - Technology |
callnumber-label | TK5105 |
callnumber-raw | TK5105.59 .S64 2003eb |
callnumber-search | TK5105.59 .S64 2003eb |
callnumber-sort | TK 45105.59 S64 42003EB |
callnumber-subject | TK - Electrical and Nuclear Engineering |
collection | ZDB-4-EBA |
contents | Front Cover; Internet Security: A Jumpstart for Systems Administrators and IT Managers; Copyright Page; Contents; Foreword; Acknowledgments; Introduction; Chapter 1. The Internet and Security; Chapter 2. The Security Review Process; Chapter 3. Cryptography; Chapter 4. Secure Networks; Chapter 5. Protecting Your Intranet from the Extranet and Internet; Chapter 6. Authentication and Authorization; Chapter 7. E-Commerce. Public Key Infrastructure; Chapter 8. Messaging Security; Chapter 9. What Are We Doing Here?; Chapter 10. Disaster Recovery; Appendix 1. Security Tools. |
ctrlnum | (OCoLC)174142945 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04716cam a2200769 a 4500</leader><controlfield tag="001">ZDB-4-EBA-ocn174142945</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20250103110447.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cnu---unuuu</controlfield><controlfield tag="008">071015s2003 ne a ob 001 0 eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="z"> 2003279708</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">N$T</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">N$T</subfield><subfield code="d">YDXCP</subfield><subfield code="d">BTCTA</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">IDEBK</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">MERUC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCF</subfield><subfield code="d">NLGGC</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OPELS</subfield><subfield code="d">OKU</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">AGLDB</subfield><subfield code="d">OCLCA</subfield><subfield code="d">STF</subfield><subfield code="d">D6H</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">VTS</subfield><subfield code="d">CEF</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">WYU</subfield><subfield code="d">LEAUB</subfield><subfield code="d">M8D</subfield><subfield code="d">INARC</subfield><subfield code="d">VLY</subfield><subfield code="d">VT2</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">COA</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield><subfield code="d">SXB</subfield><subfield code="d">OCLCQ</subfield></datafield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">GBA3X3731</subfield><subfield code="2">bnb</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">162595049</subfield><subfield code="a">173240136</subfield><subfield code="a">179819639</subfield><subfield code="a">1035659765</subfield><subfield code="a">1063815321</subfield><subfield code="a">1162288430</subfield><subfield code="a">1192345861</subfield><subfield code="a">1240532024</subfield><subfield code="a">1340085767</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080509075</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">008050907X</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781555582982</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1555582982</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1281039489</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781281039484</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9786611039486</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">6611039481</subfield></datafield><datafield tag="024" ind1="8" ind2=" "><subfield code="a">(WaSeSS)ssj0000181867</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)174142945</subfield><subfield code="z">(OCoLC)162595049</subfield><subfield code="z">(OCoLC)173240136</subfield><subfield code="z">(OCoLC)179819639</subfield><subfield code="z">(OCoLC)1035659765</subfield><subfield code="z">(OCoLC)1063815321</subfield><subfield code="z">(OCoLC)1162288430</subfield><subfield code="z">(OCoLC)1192345861</subfield><subfield code="z">(OCoLC)1240532024</subfield><subfield code="z">(OCoLC)1340085767</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">97722:97724</subfield><subfield code="b">Elsevier Science & Technology</subfield><subfield code="n">http://www.sciencedirect.com</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">TK5105.59</subfield><subfield code="b">.S64 2003eb</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">060040</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">043050</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">053000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Speed, Tim.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Internet security :</subfield><subfield code="b">a jumpstart for systems administrators and IT managers /</subfield><subfield code="c">Tim Speed, Juanita Ellis.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Amsterdam ;</subfield><subfield code="a">Boston :</subfield><subfield code="b">Digital Press,</subfield><subfield code="c">©2003.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xviii, 398 pages) :</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references (pages 321-389) and index.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Front Cover; Internet Security: A Jumpstart for Systems Administrators and IT Managers; Copyright Page; Contents; Foreword; Acknowledgments; Introduction; Chapter 1. The Internet and Security; Chapter 2. The Security Review Process; Chapter 3. Cryptography; Chapter 4. Secure Networks; Chapter 5. Protecting Your Intranet from the Extranet and Internet; Chapter 6. Authentication and Authorization; Chapter 7. E-Commerce. Public Key Infrastructure; Chapter 8. Messaging Security; Chapter 9. What Are We Doing Here?; Chapter 10. Disaster Recovery; Appendix 1. Security Tools.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Internet Security incorporates not only the technology needed to support a solid security strategy but also those policies and processes that must be incorporated in order for that strategy to work. New methods of breaking into corporate networks are resulting in major losses. This book provides the latest information on how to guard against attacks and informs the IT manager of the products that can detect and prevent break-ins. Crucial concepts such as authentication and encryption are explained, enabling the reader to understand when and where these technologies will be useful. Due to the a.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Internet</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh94001277</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Computer Security</subfield><subfield code="0">https://id.nlm.nih.gov/mesh/D016494</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Internet</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Réseaux d'ordinateurs</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Sécurité informatique.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Internet</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Networking</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Security</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Internet</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ellis, Juanita.</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Internet security (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCGWbG6wTrFdWYhw6XPMC6X</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Speed, Tim.</subfield><subfield code="t">Internet security.</subfield><subfield code="d">Amsterdam ; Boston : Digital Press, ©2003</subfield><subfield code="z">1555582982</subfield><subfield code="z">9781555582982</subfield><subfield code="w">(DLC) 2003279708</subfield><subfield code="w">(OCoLC)53896812</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-862</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=205744</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-863</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=205744</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-862</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://www.sciencedirect.com/science/book/9781555582982</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-863</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://www.sciencedirect.com/science/book/9781555582982</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Baker and Taylor</subfield><subfield code="b">BTCP</subfield><subfield code="n">BK0007500571</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">205744</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Internet Archive</subfield><subfield code="b">INAR</subfield><subfield code="n">internetsecurity0000spee</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">2636673</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-862</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-ocn174142945 |
illustrated | Illustrated |
indexdate | 2025-04-11T08:35:55Z |
institution | BVB |
isbn | 9780080509075 008050907X 9781555582982 1555582982 1281039489 9781281039484 9786611039486 6611039481 |
language | English |
oclc_num | 174142945 |
open_access_boolean | |
owner | MAIN DE-862 DE-BY-FWS DE-863 DE-BY-FWS |
owner_facet | MAIN DE-862 DE-BY-FWS DE-863 DE-BY-FWS |
physical | 1 online resource (xviii, 398 pages) : illustrations |
psigel | ZDB-4-EBA FWS_PDA_EBA ZDB-4-EBA |
publishDate | 2003 |
publishDateSearch | 2003 |
publishDateSort | 2003 |
publisher | Digital Press, |
record_format | marc |
spelling | Speed, Tim. Internet security : a jumpstart for systems administrators and IT managers / Tim Speed, Juanita Ellis. Amsterdam ; Boston : Digital Press, ©2003. 1 online resource (xviii, 398 pages) : illustrations text txt rdacontent computer c rdamedia online resource cr rdacarrier Includes bibliographical references (pages 321-389) and index. Print version record. Front Cover; Internet Security: A Jumpstart for Systems Administrators and IT Managers; Copyright Page; Contents; Foreword; Acknowledgments; Introduction; Chapter 1. The Internet and Security; Chapter 2. The Security Review Process; Chapter 3. Cryptography; Chapter 4. Secure Networks; Chapter 5. Protecting Your Intranet from the Extranet and Internet; Chapter 6. Authentication and Authorization; Chapter 7. E-Commerce. Public Key Infrastructure; Chapter 8. Messaging Security; Chapter 9. What Are We Doing Here?; Chapter 10. Disaster Recovery; Appendix 1. Security Tools. Internet Security incorporates not only the technology needed to support a solid security strategy but also those policies and processes that must be incorporated in order for that strategy to work. New methods of breaking into corporate networks are resulting in major losses. This book provides the latest information on how to guard against attacks and informs the IT manager of the products that can detect and prevent break-ins. Crucial concepts such as authentication and encryption are explained, enabling the reader to understand when and where these technologies will be useful. Due to the a. English. Internet Security measures. Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Computer security. Computer Security https://id.nlm.nih.gov/mesh/D016494 Internet Sécurité Mesures. Réseaux d'ordinateurs Sécurité Mesures. Sécurité informatique. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer networks Security measures fast Computer security fast Internet Security measures fast Ellis, Juanita. has work: Internet security (Text) https://id.oclc.org/worldcat/entity/E39PCGWbG6wTrFdWYhw6XPMC6X https://id.oclc.org/worldcat/ontology/hasWork Print version: Speed, Tim. Internet security. Amsterdam ; Boston : Digital Press, ©2003 1555582982 9781555582982 (DLC) 2003279708 (OCoLC)53896812 |
spellingShingle | Speed, Tim Internet security : a jumpstart for systems administrators and IT managers / Front Cover; Internet Security: A Jumpstart for Systems Administrators and IT Managers; Copyright Page; Contents; Foreword; Acknowledgments; Introduction; Chapter 1. The Internet and Security; Chapter 2. The Security Review Process; Chapter 3. Cryptography; Chapter 4. Secure Networks; Chapter 5. Protecting Your Intranet from the Extranet and Internet; Chapter 6. Authentication and Authorization; Chapter 7. E-Commerce. Public Key Infrastructure; Chapter 8. Messaging Security; Chapter 9. What Are We Doing Here?; Chapter 10. Disaster Recovery; Appendix 1. Security Tools. Internet Security measures. Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Computer security. Computer Security https://id.nlm.nih.gov/mesh/D016494 Internet Sécurité Mesures. Réseaux d'ordinateurs Sécurité Mesures. Sécurité informatique. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer networks Security measures fast Computer security fast Internet Security measures fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh94001277 https://id.nlm.nih.gov/mesh/D016494 |
title | Internet security : a jumpstart for systems administrators and IT managers / |
title_auth | Internet security : a jumpstart for systems administrators and IT managers / |
title_exact_search | Internet security : a jumpstart for systems administrators and IT managers / |
title_full | Internet security : a jumpstart for systems administrators and IT managers / Tim Speed, Juanita Ellis. |
title_fullStr | Internet security : a jumpstart for systems administrators and IT managers / Tim Speed, Juanita Ellis. |
title_full_unstemmed | Internet security : a jumpstart for systems administrators and IT managers / Tim Speed, Juanita Ellis. |
title_short | Internet security : |
title_sort | internet security a jumpstart for systems administrators and it managers |
title_sub | a jumpstart for systems administrators and IT managers / |
topic | Internet Security measures. Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Computer security. Computer Security https://id.nlm.nih.gov/mesh/D016494 Internet Sécurité Mesures. Réseaux d'ordinateurs Sécurité Mesures. Sécurité informatique. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer networks Security measures fast Computer security fast Internet Security measures fast |
topic_facet | Internet Security measures. Computer networks Security measures. Computer security. Computer Security Internet Sécurité Mesures. Réseaux d'ordinateurs Sécurité Mesures. Sécurité informatique. COMPUTERS Internet Security. COMPUTERS Networking Security. COMPUTERS Security General. Computer networks Security measures Computer security Internet Security measures |
work_keys_str_mv | AT speedtim internetsecurityajumpstartforsystemsadministratorsanditmanagers AT ellisjuanita internetsecurityajumpstartforsystemsadministratorsanditmanagers |