Internet security a jumpstart for systems administrators and IT managers

Internet Security incorporates not only the technology needed to support a solid security strategy but also those policies and processes that must be incorporated in order for that strategy to work. New methods of breaking into corporate networks are resulting in major losses. This book provides the...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: Speed, Tim (VerfasserIn)
Weitere Verfasser: Ellis, Juanita (MitwirkendeR)
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: Boston Digital Press 2003
Schlagworte:
Online-Zugang:lizenzpflichtig
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000cam a22000002 4500
001 ZDB-30-ORH-051694964
003 DE-627-1
005 20240228113959.0
007 cr uuu---uuuuu
008 200417s2003 xx |||||o 00| ||eng c
020 |a 9780080509075  |9 978-0-08-050907-5 
020 |a 008050907X  |9 0-08-050907-X 
020 |a 9781555582982  |9 978-1-55558-298-2 
035 |a (DE-627-1)051694964 
035 |a (DE-599)KEP051694964 
035 |a (ORHE)9781555582982 
035 |a (DE-627-1)051694964 
040 |a DE-627  |b ger  |c DE-627  |e rda 
041 |a eng 
082 0 |a 005.8  |2 21 
100 1 |a Speed, Tim  |e VerfasserIn  |4 aut 
245 1 0 |a Internet security  |b a jumpstart for systems administrators and IT managers  |c Tim Speed, Juanita Ellis 
264 1 |a Boston  |b Digital Press  |c 2003 
300 |a 1 online resource 
336 |a Text  |b txt  |2 rdacontent 
337 |a Computermedien  |b c  |2 rdamedia 
338 |a Online-Ressource  |b cr  |2 rdacarrier 
500 |a Includes bibliographical references and index 
520 |a Internet Security incorporates not only the technology needed to support a solid security strategy but also those policies and processes that must be incorporated in order for that strategy to work. New methods of breaking into corporate networks are resulting in major losses. This book provides the latest information on how to guard against attacks and informs the IT manager of the products that can detect and prevent break-ins. Crucial concepts such as authentication and encryption are explained, enabling the reader to understand when and where these technologies will be useful. Due to the a. 
650 0 |a Computer networks  |x Security measures 
650 0 |a Internet  |x Security measures 
650 0 |a Electronic commerce  |x Security measures 
650 4 |a Réseaux d'ordinateurs ; Sécurité ; Mesures 
650 4 |a Internet ; Sécurité ; Mesures 
650 4 |a Commerce électronique ; Sécurité ; Mesures 
650 4 |a Computer networks ; Security measures 
650 4 |a Electronic commerce ; Security measures 
650 4 |a Internet ; Security measures 
700 1 |a Ellis, Juanita  |e MitwirkendeR  |4 ctb 
776 1 |z 1555582982 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe  |z 1555582982 
856 4 0 |l TUM01  |p ZDB-30-ORH  |q TUM_PDA_ORH  |u https://learning.oreilly.com/library/view/-/9781555582982/?ar  |m X:ORHE  |x Aggregator  |z lizenzpflichtig  |3 Volltext 
912 |a ZDB-30-ORH 
912 |a ZDB-30-ORH 
951 |a BO 
912 |a ZDB-30-ORH 
049 |a DE-91 

Datensatz im Suchindex

DE-BY-TUM_katkey ZDB-30-ORH-051694964
_version_ 1818767273792372736
adam_text
any_adam_object
author Speed, Tim
author2 Ellis, Juanita
author2_role ctb
author2_variant j e je
author_facet Speed, Tim
Ellis, Juanita
author_role aut
author_sort Speed, Tim
author_variant t s ts
building Verbundindex
bvnumber localTUM
collection ZDB-30-ORH
ctrlnum (DE-627-1)051694964
(DE-599)KEP051694964
(ORHE)9781555582982
dewey-full 005.8
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 005 - Computer programming, programs, data, security
dewey-raw 005.8
dewey-search 005.8
dewey-sort 15.8
dewey-tens 000 - Computer science, information, general works
discipline Informatik
format Electronic
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02414cam a22005052 4500</leader><controlfield tag="001">ZDB-30-ORH-051694964</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228113959.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">200417s2003 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080509075</subfield><subfield code="9">978-0-08-050907-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">008050907X</subfield><subfield code="9">0-08-050907-X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781555582982</subfield><subfield code="9">978-1-55558-298-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)051694964</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP051694964</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781555582982</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)051694964</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">21</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Speed, Tim</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Internet security</subfield><subfield code="b">a jumpstart for systems administrators and IT managers</subfield><subfield code="c">Tim Speed, Juanita Ellis</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boston</subfield><subfield code="b">Digital Press</subfield><subfield code="c">2003</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Internet Security incorporates not only the technology needed to support a solid security strategy but also those policies and processes that must be incorporated in order for that strategy to work. New methods of breaking into corporate networks are resulting in major losses. This book provides the latest information on how to guard against attacks and informs the IT manager of the products that can detect and prevent break-ins. Crucial concepts such as authentication and encryption are explained, enabling the reader to understand when and where these technologies will be useful. Due to the a.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Internet</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Electronic commerce</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Commerce électronique ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronic commerce ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet ; Security measures</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ellis, Juanita</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">1555582982</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">1555582982</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">TUM01</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781555582982/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection>
id ZDB-30-ORH-051694964
illustrated Not Illustrated
indexdate 2024-12-18T08:47:16Z
institution BVB
isbn 9780080509075
008050907X
9781555582982
language English
open_access_boolean
owner DE-91
DE-BY-TUM
owner_facet DE-91
DE-BY-TUM
physical 1 online resource
psigel ZDB-30-ORH
publishDate 2003
publishDateSearch 2003
publishDateSort 2003
publisher Digital Press
record_format marc
spelling Speed, Tim VerfasserIn aut
Internet security a jumpstart for systems administrators and IT managers Tim Speed, Juanita Ellis
Boston Digital Press 2003
1 online resource
Text txt rdacontent
Computermedien c rdamedia
Online-Ressource cr rdacarrier
Includes bibliographical references and index
Internet Security incorporates not only the technology needed to support a solid security strategy but also those policies and processes that must be incorporated in order for that strategy to work. New methods of breaking into corporate networks are resulting in major losses. This book provides the latest information on how to guard against attacks and informs the IT manager of the products that can detect and prevent break-ins. Crucial concepts such as authentication and encryption are explained, enabling the reader to understand when and where these technologies will be useful. Due to the a.
Computer networks Security measures
Internet Security measures
Electronic commerce Security measures
Réseaux d'ordinateurs ; Sécurité ; Mesures
Internet ; Sécurité ; Mesures
Commerce électronique ; Sécurité ; Mesures
Computer networks ; Security measures
Electronic commerce ; Security measures
Internet ; Security measures
Ellis, Juanita MitwirkendeR ctb
1555582982
Erscheint auch als Druck-Ausgabe 1555582982
TUM01 ZDB-30-ORH TUM_PDA_ORH https://learning.oreilly.com/library/view/-/9781555582982/?ar X:ORHE Aggregator lizenzpflichtig Volltext
spellingShingle Speed, Tim
Internet security a jumpstart for systems administrators and IT managers
Computer networks Security measures
Internet Security measures
Electronic commerce Security measures
Réseaux d'ordinateurs ; Sécurité ; Mesures
Internet ; Sécurité ; Mesures
Commerce électronique ; Sécurité ; Mesures
Computer networks ; Security measures
Electronic commerce ; Security measures
Internet ; Security measures
title Internet security a jumpstart for systems administrators and IT managers
title_auth Internet security a jumpstart for systems administrators and IT managers
title_exact_search Internet security a jumpstart for systems administrators and IT managers
title_full Internet security a jumpstart for systems administrators and IT managers Tim Speed, Juanita Ellis
title_fullStr Internet security a jumpstart for systems administrators and IT managers Tim Speed, Juanita Ellis
title_full_unstemmed Internet security a jumpstart for systems administrators and IT managers Tim Speed, Juanita Ellis
title_short Internet security
title_sort internet security a jumpstart for systems administrators and it managers
title_sub a jumpstart for systems administrators and IT managers
topic Computer networks Security measures
Internet Security measures
Electronic commerce Security measures
Réseaux d'ordinateurs ; Sécurité ; Mesures
Internet ; Sécurité ; Mesures
Commerce électronique ; Sécurité ; Mesures
Computer networks ; Security measures
Electronic commerce ; Security measures
Internet ; Security measures
topic_facet Computer networks Security measures
Internet Security measures
Electronic commerce Security measures
Réseaux d'ordinateurs ; Sécurité ; Mesures
Internet ; Sécurité ; Mesures
Commerce électronique ; Sécurité ; Mesures
Computer networks ; Security measures
Electronic commerce ; Security measures
Internet ; Security measures
url https://learning.oreilly.com/library/view/-/9781555582982/?ar
work_keys_str_mv AT speedtim internetsecurityajumpstartforsystemsadministratorsanditmanagers
AT ellisjuanita internetsecurityajumpstartforsystemsadministratorsanditmanagers