Internet security a jumpstart for systems administrators and IT managers
Internet Security incorporates not only the technology needed to support a solid security strategy but also those policies and processes that must be incorporated in order for that strategy to work. New methods of breaking into corporate networks are resulting in major losses. This book provides the...
Gespeichert in:
1. Verfasser: | |
---|---|
Weitere Verfasser: | |
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Boston
Digital Press
2003
|
Schlagworte: | |
Online-Zugang: | lizenzpflichtig |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-051694964 | ||
003 | DE-627-1 | ||
005 | 20240228113959.0 | ||
007 | cr uuu---uuuuu | ||
008 | 200417s2003 xx |||||o 00| ||eng c | ||
020 | |a 9780080509075 |9 978-0-08-050907-5 | ||
020 | |a 008050907X |9 0-08-050907-X | ||
020 | |a 9781555582982 |9 978-1-55558-298-2 | ||
035 | |a (DE-627-1)051694964 | ||
035 | |a (DE-599)KEP051694964 | ||
035 | |a (ORHE)9781555582982 | ||
035 | |a (DE-627-1)051694964 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 005.8 |2 21 | |
100 | 1 | |a Speed, Tim |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Internet security |b a jumpstart for systems administrators and IT managers |c Tim Speed, Juanita Ellis |
264 | 1 | |a Boston |b Digital Press |c 2003 | |
300 | |a 1 online resource | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
520 | |a Internet Security incorporates not only the technology needed to support a solid security strategy but also those policies and processes that must be incorporated in order for that strategy to work. New methods of breaking into corporate networks are resulting in major losses. This book provides the latest information on how to guard against attacks and informs the IT manager of the products that can detect and prevent break-ins. Crucial concepts such as authentication and encryption are explained, enabling the reader to understand when and where these technologies will be useful. Due to the a. | ||
650 | 0 | |a Computer networks |x Security measures | |
650 | 0 | |a Internet |x Security measures | |
650 | 0 | |a Electronic commerce |x Security measures | |
650 | 4 | |a Réseaux d'ordinateurs ; Sécurité ; Mesures | |
650 | 4 | |a Internet ; Sécurité ; Mesures | |
650 | 4 | |a Commerce électronique ; Sécurité ; Mesures | |
650 | 4 | |a Computer networks ; Security measures | |
650 | 4 | |a Electronic commerce ; Security measures | |
650 | 4 | |a Internet ; Security measures | |
700 | 1 | |a Ellis, Juanita |e MitwirkendeR |4 ctb | |
776 | 1 | |z 1555582982 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 1555582982 |
856 | 4 | 0 | |l TUM01 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781555582982/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-051694964 |
---|---|
_version_ | 1818767273792372736 |
adam_text | |
any_adam_object | |
author | Speed, Tim |
author2 | Ellis, Juanita |
author2_role | ctb |
author2_variant | j e je |
author_facet | Speed, Tim Ellis, Juanita |
author_role | aut |
author_sort | Speed, Tim |
author_variant | t s ts |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)051694964 (DE-599)KEP051694964 (ORHE)9781555582982 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02414cam a22005052 4500</leader><controlfield tag="001">ZDB-30-ORH-051694964</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228113959.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">200417s2003 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080509075</subfield><subfield code="9">978-0-08-050907-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">008050907X</subfield><subfield code="9">0-08-050907-X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781555582982</subfield><subfield code="9">978-1-55558-298-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)051694964</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP051694964</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781555582982</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)051694964</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">21</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Speed, Tim</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Internet security</subfield><subfield code="b">a jumpstart for systems administrators and IT managers</subfield><subfield code="c">Tim Speed, Juanita Ellis</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boston</subfield><subfield code="b">Digital Press</subfield><subfield code="c">2003</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Internet Security incorporates not only the technology needed to support a solid security strategy but also those policies and processes that must be incorporated in order for that strategy to work. New methods of breaking into corporate networks are resulting in major losses. This book provides the latest information on how to guard against attacks and informs the IT manager of the products that can detect and prevent break-ins. Crucial concepts such as authentication and encryption are explained, enabling the reader to understand when and where these technologies will be useful. Due to the a.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Internet</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Electronic commerce</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Commerce électronique ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronic commerce ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet ; Security measures</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ellis, Juanita</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">1555582982</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">1555582982</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">TUM01</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781555582982/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-051694964 |
illustrated | Not Illustrated |
indexdate | 2024-12-18T08:47:16Z |
institution | BVB |
isbn | 9780080509075 008050907X 9781555582982 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 online resource |
psigel | ZDB-30-ORH |
publishDate | 2003 |
publishDateSearch | 2003 |
publishDateSort | 2003 |
publisher | Digital Press |
record_format | marc |
spelling | Speed, Tim VerfasserIn aut Internet security a jumpstart for systems administrators and IT managers Tim Speed, Juanita Ellis Boston Digital Press 2003 1 online resource Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Includes bibliographical references and index Internet Security incorporates not only the technology needed to support a solid security strategy but also those policies and processes that must be incorporated in order for that strategy to work. New methods of breaking into corporate networks are resulting in major losses. This book provides the latest information on how to guard against attacks and informs the IT manager of the products that can detect and prevent break-ins. Crucial concepts such as authentication and encryption are explained, enabling the reader to understand when and where these technologies will be useful. Due to the a. Computer networks Security measures Internet Security measures Electronic commerce Security measures Réseaux d'ordinateurs ; Sécurité ; Mesures Internet ; Sécurité ; Mesures Commerce électronique ; Sécurité ; Mesures Computer networks ; Security measures Electronic commerce ; Security measures Internet ; Security measures Ellis, Juanita MitwirkendeR ctb 1555582982 Erscheint auch als Druck-Ausgabe 1555582982 TUM01 ZDB-30-ORH TUM_PDA_ORH https://learning.oreilly.com/library/view/-/9781555582982/?ar X:ORHE Aggregator lizenzpflichtig Volltext |
spellingShingle | Speed, Tim Internet security a jumpstart for systems administrators and IT managers Computer networks Security measures Internet Security measures Electronic commerce Security measures Réseaux d'ordinateurs ; Sécurité ; Mesures Internet ; Sécurité ; Mesures Commerce électronique ; Sécurité ; Mesures Computer networks ; Security measures Electronic commerce ; Security measures Internet ; Security measures |
title | Internet security a jumpstart for systems administrators and IT managers |
title_auth | Internet security a jumpstart for systems administrators and IT managers |
title_exact_search | Internet security a jumpstart for systems administrators and IT managers |
title_full | Internet security a jumpstart for systems administrators and IT managers Tim Speed, Juanita Ellis |
title_fullStr | Internet security a jumpstart for systems administrators and IT managers Tim Speed, Juanita Ellis |
title_full_unstemmed | Internet security a jumpstart for systems administrators and IT managers Tim Speed, Juanita Ellis |
title_short | Internet security |
title_sort | internet security a jumpstart for systems administrators and it managers |
title_sub | a jumpstart for systems administrators and IT managers |
topic | Computer networks Security measures Internet Security measures Electronic commerce Security measures Réseaux d'ordinateurs ; Sécurité ; Mesures Internet ; Sécurité ; Mesures Commerce électronique ; Sécurité ; Mesures Computer networks ; Security measures Electronic commerce ; Security measures Internet ; Security measures |
topic_facet | Computer networks Security measures Internet Security measures Electronic commerce Security measures Réseaux d'ordinateurs ; Sécurité ; Mesures Internet ; Sécurité ; Mesures Commerce électronique ; Sécurité ; Mesures Computer networks ; Security measures Electronic commerce ; Security measures Internet ; Security measures |
url | https://learning.oreilly.com/library/view/-/9781555582982/?ar |
work_keys_str_mv | AT speedtim internetsecurityajumpstartforsystemsadministratorsanditmanagers AT ellisjuanita internetsecurityajumpstartforsystemsadministratorsanditmanagers |