Internet security a jumpstart for systems administrators and IT managers
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Amsterdam
Digital Press
[2003]
|
Schlagworte: | |
Online-Zugang: | FAW01 FAW02 UER01 Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043065265 | ||
003 | DE-604 | ||
005 | 20191121 | ||
007 | cr|uuu---uuuuu | ||
008 | 151126s2003 |||| o||u| ||||||eng d | ||
020 | |a 008050907X |c electronic bk. |9 0-08-050907-X | ||
020 | |a 9780080509075 |c electronic bk. |9 978-0-08-050907-5 | ||
035 | |a (ZDB-4-EBA)205744 | ||
035 | |a (OCoLC)174142945 | ||
035 | |a (DE-599)BVBBV043065265 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-1047 |a DE-29 | ||
082 | 0 | |a 005.8 |2 22 | |
100 | 1 | |a Speed, Tim |e Verfasser |4 aut | |
245 | 1 | 0 | |a Internet security |b a jumpstart for systems administrators and IT managers |c Tim Speed, Juanita Ellis |
264 | 1 | |a Amsterdam |b Digital Press |c [2003] | |
300 | |a 1 Online-Ressource (xviii, 398 p.) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references (p. 321-389) and index | ||
500 | |a Front Cover; Internet Security: A Jumpstart for Systems Administrators and IT Managers; Copyright Page; Contents; Foreword; Acknowledgments; Introduction; Chapter 1. The Internet and Security; Chapter 2. The Security Review Process; Chapter 3. Cryptography; Chapter 4. Secure Networks; Chapter 5. Protecting Your Intranet from the Extranet and Internet; Chapter 6. Authentication and Authorization; Chapter 7. E-Commerce. Public Key Infrastructure; Chapter 8. Messaging Security; Chapter 9. What Are We Doing Here?; Chapter 10. Disaster Recovery; Appendix 1. Security Tools | ||
500 | |a Internet Security incorporates not only the technology needed to support a solid security strategy but also those policies and processes that must be incorporated in order for that strategy to work. New methods of breaking into corporate networks are resulting in major losses. This book provides the latest information on how to guard against attacks and informs the IT manager of the products that can detect and prevent break-ins. Crucial concepts such as authentication and encryption are explained, enabling the reader to understand when and where these technologies will be useful. Due to the a | ||
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a Computer networks / Security measures |2 fast | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Internet / Security measures |2 fast | |
650 | 4 | |a Internet |x Security measures | |
650 | 4 | |a Computer networks |x Security measures | |
650 | 4 | |a Computer security | |
700 | 1 | |a Ellis, Juanita |e Sonstige |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781555582982 |
856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=205744 |x Aggregator |3 Volltext |
912 | |a ZDB-4-EBA | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-028489457 | ||
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=205744 |l FAW01 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=205744 |l FAW02 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=205744 |l UER01 |p ZDB-4-EBA |q UER_PDA_EBA_Kauf |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175443720404992 |
---|---|
any_adam_object | |
author | Speed, Tim |
author_facet | Speed, Tim |
author_role | aut |
author_sort | Speed, Tim |
author_variant | t s ts |
building | Verbundindex |
bvnumber | BV043065265 |
collection | ZDB-4-EBA |
ctrlnum | (ZDB-4-EBA)205744 (OCoLC)174142945 (DE-599)BVBBV043065265 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03413nmm a2200517zc 4500</leader><controlfield tag="001">BV043065265</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20191121 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151126s2003 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">008050907X</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-08-050907-X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080509075</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-08-050907-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-4-EBA)205744</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)174142945</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043065265</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield><subfield code="a">DE-29</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Speed, Tim</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Internet security</subfield><subfield code="b">a jumpstart for systems administrators and IT managers</subfield><subfield code="c">Tim Speed, Juanita Ellis</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Amsterdam</subfield><subfield code="b">Digital Press</subfield><subfield code="c">[2003]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xviii, 398 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references (p. 321-389) and index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Front Cover; Internet Security: A Jumpstart for Systems Administrators and IT Managers; Copyright Page; Contents; Foreword; Acknowledgments; Introduction; Chapter 1. The Internet and Security; Chapter 2. The Security Review Process; Chapter 3. Cryptography; Chapter 4. Secure Networks; Chapter 5. Protecting Your Intranet from the Extranet and Internet; Chapter 6. Authentication and Authorization; Chapter 7. E-Commerce. Public Key Infrastructure; Chapter 8. Messaging Security; Chapter 9. What Are We Doing Here?; Chapter 10. Disaster Recovery; Appendix 1. Security Tools</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Internet Security incorporates not only the technology needed to support a solid security strategy but also those policies and processes that must be incorporated in order for that strategy to work. New methods of breaking into corporate networks are resulting in major losses. This book provides the latest information on how to guard against attacks and informs the IT manager of the products that can detect and prevent break-ins. Crucial concepts such as authentication and encryption are explained, enabling the reader to understand when and where these technologies will be useful. Due to the a</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Internet / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ellis, Juanita</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781555582982</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=205744</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028489457</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=205744</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=205744</subfield><subfield code="l">FAW02</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=205744</subfield><subfield code="l">UER01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">UER_PDA_EBA_Kauf</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043065265 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:16:22Z |
institution | BVB |
isbn | 008050907X 9780080509075 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028489457 |
oclc_num | 174142945 |
open_access_boolean | |
owner | DE-1046 DE-1047 DE-29 |
owner_facet | DE-1046 DE-1047 DE-29 |
physical | 1 Online-Ressource (xviii, 398 p.) |
psigel | ZDB-4-EBA ZDB-4-EBA FAW_PDA_EBA ZDB-4-EBA UER_PDA_EBA_Kauf |
publishDate | 2003 |
publishDateSearch | 2003 |
publishDateSort | 2003 |
publisher | Digital Press |
record_format | marc |
spelling | Speed, Tim Verfasser aut Internet security a jumpstart for systems administrators and IT managers Tim Speed, Juanita Ellis Amsterdam Digital Press [2003] 1 Online-Ressource (xviii, 398 p.) txt rdacontent c rdamedia cr rdacarrier Includes bibliographical references (p. 321-389) and index Front Cover; Internet Security: A Jumpstart for Systems Administrators and IT Managers; Copyright Page; Contents; Foreword; Acknowledgments; Introduction; Chapter 1. The Internet and Security; Chapter 2. The Security Review Process; Chapter 3. Cryptography; Chapter 4. Secure Networks; Chapter 5. Protecting Your Intranet from the Extranet and Internet; Chapter 6. Authentication and Authorization; Chapter 7. E-Commerce. Public Key Infrastructure; Chapter 8. Messaging Security; Chapter 9. What Are We Doing Here?; Chapter 10. Disaster Recovery; Appendix 1. Security Tools Internet Security incorporates not only the technology needed to support a solid security strategy but also those policies and processes that must be incorporated in order for that strategy to work. New methods of breaking into corporate networks are resulting in major losses. This book provides the latest information on how to guard against attacks and informs the IT manager of the products that can detect and prevent break-ins. Crucial concepts such as authentication and encryption are explained, enabling the reader to understand when and where these technologies will be useful. Due to the a COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Computer security fast Internet / Security measures fast Internet Security measures Computer networks Security measures Computer security Ellis, Juanita Sonstige oth Erscheint auch als Druck-Ausgabe 9781555582982 http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=205744 Aggregator Volltext |
spellingShingle | Speed, Tim Internet security a jumpstart for systems administrators and IT managers COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Computer security fast Internet / Security measures fast Internet Security measures Computer networks Security measures Computer security |
title | Internet security a jumpstart for systems administrators and IT managers |
title_auth | Internet security a jumpstart for systems administrators and IT managers |
title_exact_search | Internet security a jumpstart for systems administrators and IT managers |
title_full | Internet security a jumpstart for systems administrators and IT managers Tim Speed, Juanita Ellis |
title_fullStr | Internet security a jumpstart for systems administrators and IT managers Tim Speed, Juanita Ellis |
title_full_unstemmed | Internet security a jumpstart for systems administrators and IT managers Tim Speed, Juanita Ellis |
title_short | Internet security |
title_sort | internet security a jumpstart for systems administrators and it managers |
title_sub | a jumpstart for systems administrators and IT managers |
topic | COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Computer security fast Internet / Security measures fast Internet Security measures Computer networks Security measures Computer security |
topic_facet | COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General Computer networks / Security measures Computer security Internet / Security measures Internet Security measures Computer networks Security measures |
url | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=205744 |
work_keys_str_mv | AT speedtim internetsecurityajumpstartforsystemsadministratorsanditmanagers AT ellisjuanita internetsecurityajumpstartforsystemsadministratorsanditmanagers |