|
|
|
|
LEADER |
00000cam a2200000Ia 4500 |
001 |
OR_ocm59670124 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
050426s2005 inua fob 001 0 eng d |
010 |
|
|
|a 2003108991
|
040 |
|
|
|a OCL
|b eng
|e pn
|c OCL
|d OCLCQ
|d VLB
|d OCLCQ
|d CEF
|d C6I
|d MBB
|d OCLCQ
|d OCLCF
|d OCLCO
|d OCLCQ
|d COO
|d OCLCQ
|d AU@
|d WYU
|d UAB
|d VT2
|d OCLCO
|d OCLCQ
|
015 |
|
|
|a GBA459649
|2 bnb
|
016 |
7 |
|
|a 012971739
|2 Uk
|
019 |
|
|
|a 692723169
|a 748094978
|a 1044240206
|a 1056383283
|a 1061020365
|a 1064960536
|a 1074295803
|a 1103280177
|a 1129330477
|a 1152975257
|
020 |
|
|
|a 9781587051678
|q (pbk.)
|
020 |
|
|
|a 1587051672
|q (pbk.)
|
020 |
|
|
|z 1587051672
|q (pbk.)
|
029 |
1 |
|
|a HEBIS
|b 291462707
|
035 |
|
|
|a (OCoLC)59670124
|z (OCoLC)692723169
|z (OCoLC)748094978
|z (OCoLC)1044240206
|z (OCoLC)1056383283
|z (OCoLC)1061020365
|z (OCoLC)1064960536
|z (OCoLC)1074295803
|z (OCoLC)1103280177
|z (OCoLC)1129330477
|z (OCoLC)1152975257
|
050 |
|
4 |
|a TK5105.59
|b .L34 2005
|
082 |
0 |
4 |
|a 005.8
|2 22
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Laet, Gert De.
|
245 |
1 |
0 |
|a Network security fundamentals /
|c Gert De Laet, Gert Schauwers.
|
260 |
|
|
|a Indianapolis, Ind. :
|b Cisco,
|c ©2005.
|
300 |
|
|
|a 1 online resource (xxiv, 454 pages) :
|b illustrations.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a Cisco Press fundamentals series
|
504 |
|
|
|a Includes bibliographical references (pages 427-430) and index.
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
0 |
|g Ch. 1.
|t Network security overview --
|g Ch. 2.
|t Understanding vulnerabilities -- the need for security --
|g Ch. 3.
|t Understanding defenses --
|g Ch. 4.
|t Cryptography --
|g Ch. 5.
|t Security policies --
|g Ch. 6.
|t Secure design --
|g Ch. 7.
|t Web security --
|g Ch. 8.
|t Router security --
|g Ch. 9.
|t Firewalls --
|g Ch. 10.
|t Intrusion detection system concepts --
|g Ch. 11.
|t Remote access --
|g Ch. 12.
|t Virtual private networks --
|g Ch. 13.
|t Public key infrastructure --
|g Ch. 14.
|t Wireless security --
|g Ch. 15.
|t Logging and auditing --
|g App. A.
|t SAFE blueprint --
|g App. B.
|t SANS policies --
|g App. C.
|t NSA guidelines.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a Computer networks
|x Security measures.
|2 fast
|0 (OCoLC)fst00872341
|
700 |
1 |
|
|a Schauwers, Gert.
|
776 |
0 |
8 |
|i Print version:
|a Laet, Gert De.
|t Network security fundamentals.
|d Indianapolis, Ind. : Cisco, ©2005
|z 1587051672
|w (OCoLC)56648417
|
830 |
|
0 |
|a Cisco Press fundamentals series.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/1587051672/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
994 |
|
|
|a 92
|b IZTAP
|