Internet security a jumpstart for systems administrators and IT managers

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: Speed, Tim (VerfasserIn)
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: Amsterdam Digital Press c2003
Schlagworte:
Online-Zugang:DE-1046
Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nam a2200000zc 4500
001 BV042307573
003 DE-604
005 00000000000000.0
007 cr|uuu---uuuuu
008 150129s2003 xx o|||| 00||| eng d
020 |a 1555582982  |9 1-55558-298-2 
020 |a 9781555582982  |9 978-1-55558-298-2 
035 |a (OCoLC)174142945 
035 |a (DE-599)BVBBV042307573 
040 |a DE-604  |b ger  |e aacr 
041 0 |a eng 
049 |a DE-1046 
082 0 |a 005.8  |2 22 
100 1 |a Speed, Tim  |e Verfasser  |4 aut 
245 1 0 |a Internet security  |b a jumpstart for systems administrators and IT managers  |c Tim Speed, Juanita Ellis 
264 1 |a Amsterdam  |b Digital Press  |c c2003 
300 |a 1 Online-Ressource (xviii, 398 p.) 
336 |b txt  |2 rdacontent 
337 |b c  |2 rdamedia 
338 |b cr  |2 rdacarrier 
500 |a Includes index 
500 |a Includes bibliographical references (p. 321-389) and index 
500 |a Internet Security incorporates not only the technology needed to support a solid security strategy but also those policies and processes that must be incorporated in order for that strategy to work. New methods of breaking into corporate networks are resulting in major losses. This book provides the latest information on how to guard against attacks and informs the IT manager of the products that can detect and prevent break-ins. Crucial concepts such as authentication and encryption are explained, enabling the reader to understand when and where these technologies will be useful. Due to the authors' experiences in helping corporations develop secure networks, they are able to include the newest methods for protecting corporate data. Shield data from both the internal and external intruder Discover products that can detect and prevent these break-ins Protect against major losses with the latest incident handling procedures for detecting and recovering data from new viruses Get details of a full security business review from performing the security risk analysis to justifying security expenditures based on your company's business needs 
650 7 |a Computer networks / Security measures  |2 fast 
650 7 |a Computer security  |2 fast 
650 7 |a Internet / Security measures  |2 fast 
650 4 |a Internet  |x Security measures 
650 4 |a Computer networks  |x Security measures 
650 4 |a Computer security 
700 1 |a Ellis, Juanita  |e Sonstige  |4 oth 
856 4 0 |u http://www.sciencedirect.com/science/book/9781555582982  |x Verlag  |3 Volltext 
912 |a ZDB-33-ESD 
940 1 |q FLA_PDA_ESD 
943 1 |a oai:aleph.bib-bvb.de:BVB01-027744565 
966 e |u http://www.sciencedirect.com/science/book/9781555582982  |l DE-1046  |p ZDB-33-ESD  |q FAW_PDA_ESD  |x Verlag  |3 Volltext 

Datensatz im Suchindex

_version_ 1819294013161734144
any_adam_object
author Speed, Tim
author_facet Speed, Tim
author_role aut
author_sort Speed, Tim
author_variant t s ts
building Verbundindex
bvnumber BV042307573
collection ZDB-33-ESD
ctrlnum (OCoLC)174142945
(DE-599)BVBBV042307573
dewey-full 005.8
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 005 - Computer programming, programs, data, security
dewey-raw 005.8
dewey-search 005.8
dewey-sort 15.8
dewey-tens 000 - Computer science, information, general works
discipline Informatik
format Electronic
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02719nam a2200445zc 4500</leader><controlfield tag="001">BV042307573</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">150129s2003 xx o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1555582982</subfield><subfield code="9">1-55558-298-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781555582982</subfield><subfield code="9">978-1-55558-298-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)174142945</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042307573</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Speed, Tim</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Internet security</subfield><subfield code="b">a jumpstart for systems administrators and IT managers</subfield><subfield code="c">Tim Speed, Juanita Ellis</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Amsterdam</subfield><subfield code="b">Digital Press</subfield><subfield code="c">c2003</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xviii, 398 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references (p. 321-389) and index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Internet Security incorporates not only the technology needed to support a solid security strategy but also those policies and processes that must be incorporated in order for that strategy to work. New methods of breaking into corporate networks are resulting in major losses. This book provides the latest information on how to guard against attacks and informs the IT manager of the products that can detect and prevent break-ins. Crucial concepts such as authentication and encryption are explained, enabling the reader to understand when and where these technologies will be useful. Due to the authors' experiences in helping corporations develop secure networks, they are able to include the newest methods for protecting corporate data. Shield data from both the internal and external intruder Discover products that can detect and prevent these break-ins Protect against major losses with the latest incident handling procedures for detecting and recovering data from new viruses Get details of a full security business review from performing the security risk analysis to justifying security expenditures based on your company's business needs</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Internet / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ellis, Juanita</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9781555582982</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">FLA_PDA_ESD</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027744565</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.sciencedirect.com/science/book/9781555582982</subfield><subfield code="l">DE-1046</subfield><subfield code="p">ZDB-33-ESD</subfield><subfield code="q">FAW_PDA_ESD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection>
id DE-604.BV042307573
illustrated Not Illustrated
indexdate 2024-12-24T04:19:34Z
institution BVB
isbn 1555582982
9781555582982
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-027744565
oclc_num 174142945
open_access_boolean
owner DE-1046
owner_facet DE-1046
physical 1 Online-Ressource (xviii, 398 p.)
psigel ZDB-33-ESD
FLA_PDA_ESD
ZDB-33-ESD FAW_PDA_ESD
publishDate 2003
publishDateSearch 2003
publishDateSort 2003
publisher Digital Press
record_format marc
spelling Speed, Tim Verfasser aut
Internet security a jumpstart for systems administrators and IT managers Tim Speed, Juanita Ellis
Amsterdam Digital Press c2003
1 Online-Ressource (xviii, 398 p.)
txt rdacontent
c rdamedia
cr rdacarrier
Includes index
Includes bibliographical references (p. 321-389) and index
Internet Security incorporates not only the technology needed to support a solid security strategy but also those policies and processes that must be incorporated in order for that strategy to work. New methods of breaking into corporate networks are resulting in major losses. This book provides the latest information on how to guard against attacks and informs the IT manager of the products that can detect and prevent break-ins. Crucial concepts such as authentication and encryption are explained, enabling the reader to understand when and where these technologies will be useful. Due to the authors' experiences in helping corporations develop secure networks, they are able to include the newest methods for protecting corporate data. Shield data from both the internal and external intruder Discover products that can detect and prevent these break-ins Protect against major losses with the latest incident handling procedures for detecting and recovering data from new viruses Get details of a full security business review from performing the security risk analysis to justifying security expenditures based on your company's business needs
Computer networks / Security measures fast
Computer security fast
Internet / Security measures fast
Internet Security measures
Computer networks Security measures
Computer security
Ellis, Juanita Sonstige oth
http://www.sciencedirect.com/science/book/9781555582982 Verlag Volltext
spellingShingle Speed, Tim
Internet security a jumpstart for systems administrators and IT managers
Computer networks / Security measures fast
Computer security fast
Internet / Security measures fast
Internet Security measures
Computer networks Security measures
Computer security
title Internet security a jumpstart for systems administrators and IT managers
title_auth Internet security a jumpstart for systems administrators and IT managers
title_exact_search Internet security a jumpstart for systems administrators and IT managers
title_full Internet security a jumpstart for systems administrators and IT managers Tim Speed, Juanita Ellis
title_fullStr Internet security a jumpstart for systems administrators and IT managers Tim Speed, Juanita Ellis
title_full_unstemmed Internet security a jumpstart for systems administrators and IT managers Tim Speed, Juanita Ellis
title_short Internet security
title_sort internet security a jumpstart for systems administrators and it managers
title_sub a jumpstart for systems administrators and IT managers
topic Computer networks / Security measures fast
Computer security fast
Internet / Security measures fast
Internet Security measures
Computer networks Security measures
Computer security
topic_facet Computer networks / Security measures
Computer security
Internet / Security measures
Internet Security measures
Computer networks Security measures
url http://www.sciencedirect.com/science/book/9781555582982
work_keys_str_mv AT speedtim internetsecurityajumpstartforsystemsadministratorsanditmanagers
AT ellisjuanita internetsecurityajumpstartforsystemsadministratorsanditmanagers