|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
EBOOKCENTRAL_ocm51563418 |
003 |
OCoLC |
005 |
20240329122006.0 |
006 |
m o d |
007 |
cr cn||||||||| |
008 |
030203s2001 maua o 001 0 eng d |
040 |
|
|
|a N$T
|b eng
|e pn
|c N$T
|d OCLCQ
|d YDXCP
|d OCLCQ
|d TUU
|d OCLCQ
|d TNF
|d OCLCQ
|d OCLCF
|d OCLCO
|d OCLCQ
|d OPELS
|d MERUC
|d CCO
|d E7B
|d VVN
|d REDDC
|d DKDLA
|d NNM
|d FVL
|d DEBSZ
|d IDEBK
|d K6U
|d B24X7
|d EBLCP
|d UKDOC
|d OCLCQ
|d AZK
|d AGLDB
|d COCUF
|d CNNOR
|d MOR
|d PIFBR
|d ZCU
|d OCLCQ
|d OCLCO
|d WY@
|d U3W
|d OCLCA
|d LUE
|d STF
|d BRL
|d WRM
|d D6H
|d VTS
|d NRAMU
|d ICG
|d INT
|d VT2
|d TOF
|d OCLCQ
|d OCLCO
|d A6Q
|d OCLCQ
|d DKC
|d OCLCQ
|d UKCRE
|d HS0
|d ADU
|d BRF
|d EYM
|d TUHNV
|d OCLCO
|d OCLCQ
|d OCLCO
|d OCLCL
|
015 |
|
|
|a GBA2Z3818
|2 bnb
|
016 |
7 |
|
|a 1931836493
|2 Uk
|
019 |
|
|
|a 49889547
|a 70749362
|a 162598816
|a 174131084
|a 437181460
|a 488335004
|a 559474542
|a 646706633
|a 722109308
|a 728006372
|a 744592312
|a 765142364
|a 888412695
|a 961645220
|a 961687637
|a 962651830
|a 962675265
|a 988426954
|a 992062382
|a 992093275
|a 1035668854
|a 1037405889
|a 1038592953
|a 1045560244
|a 1053048582
|a 1055317107
|a 1076287255
|a 1081256051
|a 1086511839
|a 1153509438
|a 1160092533
|a 1194813983
|a 1228554144
|a 1243600131
|a 1252728110
|
020 |
|
|
|a 1932266151
|q (electronic bk.)
|
020 |
|
|
|a 9781932266153
|q (electronic bk.)
|
020 |
|
|
|a 9781931836494
|
020 |
|
|
|a 1931836493
|
020 |
|
|
|a 9780080478142
|q (electronic bk.)
|
020 |
|
|
|a 008047814X
|q (electronic bk.)
|
029 |
1 |
|
|a AU@
|b 000050963025
|
029 |
1 |
|
|a AU@
|b 000051557265
|
029 |
1 |
|
|a AU@
|b 000053222083
|
029 |
1 |
|
|a AU@
|b 000054154270
|
029 |
1 |
|
|a AU@
|b 000066757717
|
029 |
1 |
|
|a CHNEW
|b 001004520
|
029 |
1 |
|
|a DEBBG
|b BV042307701
|
029 |
1 |
|
|a DEBBG
|b BV043083469
|
029 |
1 |
|
|a DEBBG
|b BV044124171
|
029 |
1 |
|
|a DEBSZ
|b 405314108
|
029 |
1 |
|
|a DEBSZ
|b 422447048
|
029 |
1 |
|
|a GBVCP
|b 800925610
|
029 |
1 |
|
|a NZ1
|b 12435681
|
035 |
|
|
|a (OCoLC)51563418
|z (OCoLC)49889547
|z (OCoLC)70749362
|z (OCoLC)162598816
|z (OCoLC)174131084
|z (OCoLC)437181460
|z (OCoLC)488335004
|z (OCoLC)559474542
|z (OCoLC)646706633
|z (OCoLC)722109308
|z (OCoLC)728006372
|z (OCoLC)744592312
|z (OCoLC)765142364
|z (OCoLC)888412695
|z (OCoLC)961645220
|z (OCoLC)961687637
|z (OCoLC)962651830
|z (OCoLC)962675265
|z (OCoLC)988426954
|z (OCoLC)992062382
|z (OCoLC)992093275
|z (OCoLC)1035668854
|z (OCoLC)1037405889
|z (OCoLC)1038592953
|z (OCoLC)1045560244
|z (OCoLC)1053048582
|z (OCoLC)1055317107
|z (OCoLC)1076287255
|z (OCoLC)1081256051
|z (OCoLC)1086511839
|z (OCoLC)1153509438
|z (OCoLC)1160092533
|z (OCoLC)1194813983
|z (OCoLC)1228554144
|z (OCoLC)1243600131
|z (OCoLC)1252728110
|
037 |
|
|
|a 100809:100820
|b Elsevier Science & Technology
|n http://www.sciencedirect.com
|
050 |
|
4 |
|a QA76.9.A25
|b T63 2001eb
|
072 |
|
7 |
|a COM
|x 060040
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 043050
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 21
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Todd, Chad.
|
245 |
1 |
0 |
|a Hack proofing Windows 2000 /
|c Chad Todd ; Norris L. Johnson, Jr., technical editor.
|
246 |
1 |
4 |
|a Hack proofing Windows 2000 server
|
260 |
|
|
|a Rockland, MA :
|b Syngress,
|c ©2001.
|
300 |
|
|
|a 1 online resource (xxv, 693 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a data file
|
490 |
1 |
|
|a ITpro collection
|
500 |
|
|
|a Includes index.
|
588 |
0 |
|
|a Print version record.
|
520 |
|
|
|a The complete, authoritative guide to protecting your Windows 2000 Network "Essential reading for your IT security organization."--Deena Joyce, Director of Information Technology and Network Security, Casino Magic Pick up a newspaper or watch the evening news and you will find a major news story involving a breech of network security. Windows 2000, as the premier network platform, has many important security features but they are difficult to configure and manage. Hack Proofing Windows 2000 Server has totally up-to-date coverage of Service Pack 2 (SP2), Kerberos and Public Key Infrastructure and also addresses newer topics such as Virtual Private Networks (VPNs), remote access and web site security. The book also has complete coverage of Internet Information Server (IIS) release 5. A great addition to the bestselling "Hack Proofing ..." series Windows 2000 sales have surpassed those of Windows NT Critical topic. The security of an organization's data and communications is crucial to its survival and these topics are notoriously difficult to grasp Unrivalled web support at www.solutions@syngress.com
|
505 |
0 |
|
|a 1931836493.pdf; 1931836493.pdf; Cover; Table of Contents; Chapter 1 The Windows 2000 Server Security Migration Path; Chapter 2 Default Access Control Settings; Chapter 3 Kerberos Server Authentication; Chapter 4 Secure Networking Using Windows 2000 Distributed Security Services; Chapter 5 Security Configuration Tool Set; Chapter 6 Encrypting the File System for Windows 2000; Chapter 7 IP Security for Microsoft Windows 2000 Server; Chapter 8 Smart Cards; Chapter 9 Microsoft Windows 2000 Public Key Infrastructure; Chapter 10 Supporting Non-Windows 2000 Clients and Servers.
|
505 |
8 |
|
|a Chapter 11 Securing Internet Information Services 5.0Chapter 12 Using Security-Related Tools; Appendix A Port Numbers; Index; Related Titles.
|
590 |
|
|
|a ProQuest Ebook Central
|b Ebook Central Academic Complete
|
590 |
|
|
|a eBooks on EBSCOhost
|b EBSCO eBook Subscription Academic Collection - Worldwide
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a COMPUTERS
|x Internet
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Networking
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computer networks
|x Security measures
|2 fast
|
650 |
|
7 |
|a Computer security
|2 fast
|
700 |
1 |
|
|a Johnson, Norris L.
|
758 |
|
|
|i has work:
|a Hack proofing Windows 2000 (Text)
|1 https://id.oclc.org/worldcat/entity/E39PCY7Y76Gp3gH8dpFdJVPw3P
|4 https://id.oclc.org/worldcat/ontology/hasWork
|
776 |
0 |
8 |
|i Print version:
|a Todd, Chad.
|t Hack proofing Windows 2000.
|d Rockland, MA : Syngress, ©2001
|z 1931836493
|w (OCoLC)48783735
|
830 |
|
0 |
|a ITpro collection.
|
856 |
4 |
0 |
|u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=294154
|z Texto completo
|
938 |
|
|
|a 123Library
|b 123L
|n 34038
|
938 |
|
|
|a Books 24x7
|b B247
|n bks00001798
|
938 |
|
|
|a EBL - Ebook Library
|b EBLB
|n EBL294154
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 75915
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 2361850
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 2711666
|
994 |
|
|
|a 92
|b IZTAP
|