Internet security a jumpstart for systems administrators and IT managers

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: Speed, Tim (VerfasserIn)
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: Amsterdam Digital Press [2003]
Schlagworte:
Online-Zugang:FAW01
FAW02
UER01
Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nmm a2200000zc 4500
001 BV043065265
003 DE-604
005 20191121
007 cr|uuu---uuuuu
008 151126s2003 |||| o||u| ||||||eng d
020 |a 008050907X  |c electronic bk.  |9 0-08-050907-X 
020 |a 9780080509075  |c electronic bk.  |9 978-0-08-050907-5 
035 |a (ZDB-4-EBA)205744 
035 |a (OCoLC)174142945 
035 |a (DE-599)BVBBV043065265 
040 |a DE-604  |b ger  |e aacr 
041 0 |a eng 
049 |a DE-1046  |a DE-1047  |a DE-29 
082 0 |a 005.8  |2 22 
100 1 |a Speed, Tim  |e Verfasser  |4 aut 
245 1 0 |a Internet security  |b a jumpstart for systems administrators and IT managers  |c Tim Speed, Juanita Ellis 
264 1 |a Amsterdam  |b Digital Press  |c [2003] 
300 |a 1 Online-Ressource (xviii, 398 p.) 
336 |b txt  |2 rdacontent 
337 |b c  |2 rdamedia 
338 |b cr  |2 rdacarrier 
500 |a Includes bibliographical references (p. 321-389) and index 
500 |a Front Cover; Internet Security: A Jumpstart for Systems Administrators and IT Managers; Copyright Page; Contents; Foreword; Acknowledgments; Introduction; Chapter 1. The Internet and Security; Chapter 2. The Security Review Process; Chapter 3. Cryptography; Chapter 4. Secure Networks; Chapter 5. Protecting Your Intranet from the Extranet and Internet; Chapter 6. Authentication and Authorization; Chapter 7. E-Commerce. Public Key Infrastructure; Chapter 8. Messaging Security; Chapter 9. What Are We Doing Here?; Chapter 10. Disaster Recovery; Appendix 1. Security Tools 
500 |a Internet Security incorporates not only the technology needed to support a solid security strategy but also those policies and processes that must be incorporated in order for that strategy to work. New methods of breaking into corporate networks are resulting in major losses. This book provides the latest information on how to guard against attacks and informs the IT manager of the products that can detect and prevent break-ins. Crucial concepts such as authentication and encryption are explained, enabling the reader to understand when and where these technologies will be useful. Due to the a 
650 7 |a COMPUTERS / Internet / Security  |2 bisacsh 
650 7 |a COMPUTERS / Networking / Security  |2 bisacsh 
650 7 |a COMPUTERS / Security / General  |2 bisacsh 
650 7 |a Computer networks / Security measures  |2 fast 
650 7 |a Computer security  |2 fast 
650 7 |a Internet / Security measures  |2 fast 
650 4 |a Internet  |x Security measures 
650 4 |a Computer networks  |x Security measures 
650 4 |a Computer security 
700 1 |a Ellis, Juanita  |e Sonstige  |4 oth 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe  |z 9781555582982 
856 4 0 |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=205744  |x Aggregator  |3 Volltext 
912 |a ZDB-4-EBA 
999 |a oai:aleph.bib-bvb.de:BVB01-028489457 
966 e |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=205744  |l FAW01  |p ZDB-4-EBA  |q FAW_PDA_EBA  |x Aggregator  |3 Volltext 
966 e |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=205744  |l FAW02  |p ZDB-4-EBA  |q FAW_PDA_EBA  |x Aggregator  |3 Volltext 
966 e |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=205744  |l UER01  |p ZDB-4-EBA  |q UER_PDA_EBA_Kauf  |x Aggregator  |3 Volltext 

Datensatz im Suchindex

_version_ 1804175443720404992
any_adam_object
author Speed, Tim
author_facet Speed, Tim
author_role aut
author_sort Speed, Tim
author_variant t s ts
building Verbundindex
bvnumber BV043065265
collection ZDB-4-EBA
ctrlnum (ZDB-4-EBA)205744
(OCoLC)174142945
(DE-599)BVBBV043065265
dewey-full 005.8
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 005 - Computer programming, programs, data, security
dewey-raw 005.8
dewey-search 005.8
dewey-sort 15.8
dewey-tens 000 - Computer science, information, general works
discipline Informatik
format Electronic
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03413nmm a2200517zc 4500</leader><controlfield tag="001">BV043065265</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20191121 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151126s2003 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">008050907X</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-08-050907-X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080509075</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-08-050907-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-4-EBA)205744</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)174142945</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043065265</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield><subfield code="a">DE-29</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Speed, Tim</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Internet security</subfield><subfield code="b">a jumpstart for systems administrators and IT managers</subfield><subfield code="c">Tim Speed, Juanita Ellis</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Amsterdam</subfield><subfield code="b">Digital Press</subfield><subfield code="c">[2003]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xviii, 398 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references (p. 321-389) and index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Front Cover; Internet Security: A Jumpstart for Systems Administrators and IT Managers; Copyright Page; Contents; Foreword; Acknowledgments; Introduction; Chapter 1. The Internet and Security; Chapter 2. The Security Review Process; Chapter 3. Cryptography; Chapter 4. Secure Networks; Chapter 5. Protecting Your Intranet from the Extranet and Internet; Chapter 6. Authentication and Authorization; Chapter 7. E-Commerce. Public Key Infrastructure; Chapter 8. Messaging Security; Chapter 9. What Are We Doing Here?; Chapter 10. Disaster Recovery; Appendix 1. Security Tools</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Internet Security incorporates not only the technology needed to support a solid security strategy but also those policies and processes that must be incorporated in order for that strategy to work. New methods of breaking into corporate networks are resulting in major losses. This book provides the latest information on how to guard against attacks and informs the IT manager of the products that can detect and prevent break-ins. Crucial concepts such as authentication and encryption are explained, enabling the reader to understand when and where these technologies will be useful. Due to the a</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Internet / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ellis, Juanita</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781555582982</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&amp;scope=site&amp;db=nlebk&amp;db=nlabk&amp;AN=205744</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028489457</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&amp;scope=site&amp;db=nlebk&amp;db=nlabk&amp;AN=205744</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&amp;scope=site&amp;db=nlebk&amp;db=nlabk&amp;AN=205744</subfield><subfield code="l">FAW02</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&amp;scope=site&amp;db=nlebk&amp;db=nlabk&amp;AN=205744</subfield><subfield code="l">UER01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">UER_PDA_EBA_Kauf</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection>
id DE-604.BV043065265
illustrated Not Illustrated
indexdate 2024-07-10T07:16:22Z
institution BVB
isbn 008050907X
9780080509075
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-028489457
oclc_num 174142945
open_access_boolean
owner DE-1046
DE-1047
DE-29
owner_facet DE-1046
DE-1047
DE-29
physical 1 Online-Ressource (xviii, 398 p.)
psigel ZDB-4-EBA
ZDB-4-EBA FAW_PDA_EBA
ZDB-4-EBA UER_PDA_EBA_Kauf
publishDate 2003
publishDateSearch 2003
publishDateSort 2003
publisher Digital Press
record_format marc
spelling Speed, Tim Verfasser aut
Internet security a jumpstart for systems administrators and IT managers Tim Speed, Juanita Ellis
Amsterdam Digital Press [2003]
1 Online-Ressource (xviii, 398 p.)
txt rdacontent
c rdamedia
cr rdacarrier
Includes bibliographical references (p. 321-389) and index
Front Cover; Internet Security: A Jumpstart for Systems Administrators and IT Managers; Copyright Page; Contents; Foreword; Acknowledgments; Introduction; Chapter 1. The Internet and Security; Chapter 2. The Security Review Process; Chapter 3. Cryptography; Chapter 4. Secure Networks; Chapter 5. Protecting Your Intranet from the Extranet and Internet; Chapter 6. Authentication and Authorization; Chapter 7. E-Commerce. Public Key Infrastructure; Chapter 8. Messaging Security; Chapter 9. What Are We Doing Here?; Chapter 10. Disaster Recovery; Appendix 1. Security Tools
Internet Security incorporates not only the technology needed to support a solid security strategy but also those policies and processes that must be incorporated in order for that strategy to work. New methods of breaking into corporate networks are resulting in major losses. This book provides the latest information on how to guard against attacks and informs the IT manager of the products that can detect and prevent break-ins. Crucial concepts such as authentication and encryption are explained, enabling the reader to understand when and where these technologies will be useful. Due to the a
COMPUTERS / Internet / Security bisacsh
COMPUTERS / Networking / Security bisacsh
COMPUTERS / Security / General bisacsh
Computer networks / Security measures fast
Computer security fast
Internet / Security measures fast
Internet Security measures
Computer networks Security measures
Computer security
Ellis, Juanita Sonstige oth
Erscheint auch als Druck-Ausgabe 9781555582982
http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=205744 Aggregator Volltext
spellingShingle Speed, Tim
Internet security a jumpstart for systems administrators and IT managers
COMPUTERS / Internet / Security bisacsh
COMPUTERS / Networking / Security bisacsh
COMPUTERS / Security / General bisacsh
Computer networks / Security measures fast
Computer security fast
Internet / Security measures fast
Internet Security measures
Computer networks Security measures
Computer security
title Internet security a jumpstart for systems administrators and IT managers
title_auth Internet security a jumpstart for systems administrators and IT managers
title_exact_search Internet security a jumpstart for systems administrators and IT managers
title_full Internet security a jumpstart for systems administrators and IT managers Tim Speed, Juanita Ellis
title_fullStr Internet security a jumpstart for systems administrators and IT managers Tim Speed, Juanita Ellis
title_full_unstemmed Internet security a jumpstart for systems administrators and IT managers Tim Speed, Juanita Ellis
title_short Internet security
title_sort internet security a jumpstart for systems administrators and it managers
title_sub a jumpstart for systems administrators and IT managers
topic COMPUTERS / Internet / Security bisacsh
COMPUTERS / Networking / Security bisacsh
COMPUTERS / Security / General bisacsh
Computer networks / Security measures fast
Computer security fast
Internet / Security measures fast
Internet Security measures
Computer networks Security measures
Computer security
topic_facet COMPUTERS / Internet / Security
COMPUTERS / Networking / Security
COMPUTERS / Security / General
Computer networks / Security measures
Computer security
Internet / Security measures
Internet Security measures
Computer networks Security measures
url http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=205744
work_keys_str_mv AT speedtim internetsecurityajumpstartforsystemsadministratorsanditmanagers
AT ellisjuanita internetsecurityajumpstartforsystemsadministratorsanditmanagers