|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
EBSCO_ocm45843371 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cn||||||||| |
008 |
010126s2000 maua ob 001 0 eng d |
040 |
|
|
|a N$T
|b eng
|e pn
|c N$T
|d OCL
|d OCLCQ
|d YDXCP
|d OCLCQ
|d EXW
|d HNW
|d OCLCQ
|d TUU
|d OCLCQ
|d ZCU
|d OCLCO
|d QT5
|d OCLCE
|d W2U
|d OCLCF
|d OCLCQ
|d OCLCO
|d OCLCQ
|d Z5A
|d JBG
|d OCLCQ
|d SAV
|d ICD
|d QT7
|d OCLCQ
|d OCLCA
|d LUE
|d CEF
|d OCLCQ
|d INT
|d OCLCQ
|d LHU
|d BRX
|d JX9
|d UMK
|d VDB
|d CHBRC
|d UKEHC
|d OCLCO
|d OCLCQ
|d IOY
|d OCLCQ
|d CAUOI
|d D6H
|d OCLCQ
|
019 |
|
|
|a 533131029
|a 607360361
|a 607770620
|a 612802996
|a 758976223
|a 961609764
|a 962723277
|a 988817971
|a 1004486126
|a 1004803935
|a 1005044953
|a 1007382942
|a 1008891387
|a 1013736884
|a 1017968341
|a 1021218022
|a 1044055290
|a 1053018918
|a 1055841628
|a 1071925738
|a 1084492983
|a 1087302248
|a 1108904366
|a 1123226998
|a 1127916741
|a 1135426126
|a 1200055615
|a 1320983083
|a 1331422485
|
020 |
|
|
|a 0585337659
|q (electronic bk.)
|
020 |
|
|
|a 9780585337654
|q (electronic bk.)
|
020 |
|
|
|a 1580530451
|q (alk. paper)
|
020 |
|
|
|a 9781580530453
|q (alk. paper)
|
029 |
1 |
|
|a AU@
|b 000023098884
|
029 |
1 |
|
|a DEBBG
|b BV043145861
|
029 |
1 |
|
|a DEBSZ
|b 422511501
|
029 |
1 |
|
|a GBVCP
|b 800743032
|
029 |
1 |
|
|a NZ1
|b 11632712
|
029 |
1 |
|
|a NZ1
|b 13666483
|
035 |
|
|
|a (OCoLC)45843371
|z (OCoLC)533131029
|z (OCoLC)607360361
|z (OCoLC)607770620
|z (OCoLC)612802996
|z (OCoLC)758976223
|z (OCoLC)961609764
|z (OCoLC)962723277
|z (OCoLC)988817971
|z (OCoLC)1004486126
|z (OCoLC)1004803935
|z (OCoLC)1005044953
|z (OCoLC)1007382942
|z (OCoLC)1008891387
|z (OCoLC)1013736884
|z (OCoLC)1017968341
|z (OCoLC)1021218022
|z (OCoLC)1044055290
|z (OCoLC)1053018918
|z (OCoLC)1055841628
|z (OCoLC)1071925738
|z (OCoLC)1084492983
|z (OCoLC)1087302248
|z (OCoLC)1108904366
|z (OCoLC)1123226998
|z (OCoLC)1127916741
|z (OCoLC)1135426126
|z (OCoLC)1200055615
|z (OCoLC)1320983083
|z (OCoLC)1331422485
|
042 |
|
|
|a dlr
|
050 |
|
4 |
|a QA76.9.A25
|b O68 1999eb
|
072 |
|
7 |
|a COM
|x 060040
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 043050
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 21
|
084 |
|
|
|a 54.65
|2 bcl
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Oppliger, Rolf.
|
245 |
1 |
0 |
|a Security technologies for the World Wide Web /
|c Rolf Oppliger.
|
260 |
|
|
|a Boston, MA :
|b Artech House,
|c ©2000.
|
300 |
|
|
|a 1 online resource (xxi, 419 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|
347 |
|
|
|b PDF
|
490 |
1 |
|
|a Artech House computer security series
|
500 |
|
|
|a "Artech House computing library."
|
504 |
|
|
|a Includes bibliographical references and index.
|
505 |
0 |
0 |
|t Internet --
|t WWW --
|t Vulnerabilities, threats, and countermeasures --
|t Generic security model --
|t Security policy --
|t Host security --
|t Network security --
|t Organizational security --
|t Legal security --
|t HTTP Security --
|t HTTP --
|t User authentication, authorization, and access control --
|t Basic authentication --
|t Digest access authentication --
|t Certificate-based authentication --
|t Sever configuration --
|t Configuring HTTP basic authentication --
|t Configuring HTTP digest access authentication --
|t Proxy Servers and Firewalls --
|t Static packet filtering --
|t Dynamic packet filtering or stateful inspection --
|t Circuit-level gateways --
|t Application-level gateways --
|t Firewall configurations --
|t Dual-homed firewall --
|t Screened host firewall --
|t Screened subnet firewall --
|t Network address translation --
|t Configuring the browser --
|t Cryptographic Techniques --
|t Cryptographic hash functions --
|t Secret key cryptography --
|t DES --
|t Triple-DES --
|t IDEA --
|t SAFER --
|t Blowfish --
|t CAST-128 --
|t RC2, RC4, RC5, and RC6 --
|t AES --
|t Public key cryptography --
|t RSA --
|t Diffie-Hellman --
|t ElGamal --
|t DSS --
|t ECC --
|t Digital envelopes --
|t Protection of cryptographic keys --
|t Generation of pseudorandom bit sequences --
|t Legal issues --
|t Patent claims --
|t Regulations --
|t Electronic and digital signature legislation --
|t Internet Security Protocols --
|t Network access layer security protocols --
|t Layer 2 Forwarding Protocol --
|t Point-to-Point Tunneling Protocol --
|t Layer 2 Tunneling Protocol --
|t Virtual private networking --
|t Internet layer security protocols --
|t IP security architecture.
|
506 |
|
|
|3 Use copy
|f Restrictions unspecified
|2 star
|5 MiAaHDL
|
533 |
|
|
|a Electronic reproduction.
|b [Place of publication not identified] :
|c HathiTrust Digital Library,
|d 2010.
|5 MiAaHDL
|
538 |
|
|
|a Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.
|u http://purl.oclc.org/DLF/benchrepro0212
|5 MiAaHDL
|
583 |
1 |
|
|a digitized
|c 2010
|h HathiTrust Digital Library
|l committed to preserve
|2 pda
|5 MiAaHDL
|
588 |
0 |
|
|a Print version record.
|
520 |
1 |
|
|a "This hands-on book gives you a comprehensive analysis of current trends in WWW security, plus an evaluation of existing technologies, such as anonymity services and security products. It helps you guarantee that electronic commerce applications on your website are executed with the utmost security and protection. What's more, it helps you understand content protection and the benefits and drawbacks of censorship on the web."--BOOK JACKET. "Geared toward proactive Internet security professionals, this handy resource helps you comprehend existing security technologies, evaluate and choose those that best suit your needs, understand corresponding software and hardware, and more."--Jacket
|
590 |
|
|
|a eBooks on EBSCOhost
|b EBSCO eBook Subscription Academic Collection - Worldwide
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a World Wide Web
|x Security measures.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Web
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a COMPUTERS
|x Internet
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Networking
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computer security.
|2 fast
|0 (OCoLC)fst00872484
|
650 |
|
7 |
|a World Wide Web
|x Security measures.
|2 fast
|0 (OCoLC)fst01181329
|
650 |
1 |
7 |
|a World wide web.
|2 gtt
|
650 |
1 |
7 |
|a Beveiliging.
|2 gtt
|
776 |
0 |
8 |
|i Print version:
|a Oppliger, Rolf.
|t Security technologies for the World Wide Web.
|d Boston, MA : Artech House, ©2000
|z 1580530451
|w (DLC) 99045835
|w (OCoLC)42295827
|
830 |
|
0 |
|a Artech House computer security series.
|
856 |
4 |
0 |
|u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=42390
|z Texto completo
|
936 |
|
|
|a BATCHLOAD
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 42390
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 2323101
|
994 |
|
|
|a 92
|b IZTAP
|