|
|
|
|
LEADER |
00000cam a2200000Ia 4500 |
001 |
OR_ocm59670192 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
050426s2005 inua o 001 0 eng d |
010 |
|
|
|z 2003115153
|
040 |
|
|
|a OCL
|b eng
|e pn
|c OCL
|d OCLCQ
|d VLB
|d OCLCQ
|d CEF
|d C6I
|d MBB
|d OCLCQ
|d OCLCE
|d OCLCO
|d OCLCQ
|d YDX
|d OCLCA
|d OCLCF
|d OCLCO
|d OCLCA
|d AU@
|d WYU
|d UAB
|d VT2
|d LDP
|d OCLCO
|d OCLCQ
|
019 |
|
|
|a 692723373
|a 748095012
|a 892052225
|a 1044298293
|a 1056382428
|a 1061013615
|a 1066476262
|a 1073064357
|a 1083194678
|a 1103254552
|a 1104444247
|a 1129342295
|a 1152977158
|a 1156933745
|a 1179125176
|a 1192340737
|a 1240528566
|
020 |
|
|
|z 1587201216
|
020 |
|
|
|z 9781587201219
|q (pbk.)
|
020 |
|
|
|a 0133819035
|
020 |
|
|
|a 9780133819038
|
029 |
1 |
|
|a HEBIS
|b 291463479
|
035 |
|
|
|a (OCoLC)59670192
|z (OCoLC)692723373
|z (OCoLC)748095012
|z (OCoLC)892052225
|z (OCoLC)1044298293
|z (OCoLC)1056382428
|z (OCoLC)1061013615
|z (OCoLC)1066476262
|z (OCoLC)1073064357
|z (OCoLC)1083194678
|z (OCoLC)1103254552
|z (OCoLC)1104444247
|z (OCoLC)1129342295
|z (OCoLC)1152977158
|z (OCoLC)1156933745
|z (OCoLC)1179125176
|z (OCoLC)1192340737
|z (OCoLC)1240528566
|
042 |
|
|
|a dlr
|
043 |
|
|
|a n-us---
|
050 |
|
4 |
|a TK5105.59
|b .P37 2005
|
082 |
0 |
4 |
|a 005.8
|2 22
|
084 |
|
|
|a ST 277
|2 rvk
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Paquet, Catherine.
|
245 |
1 |
4 |
|a The business case for network security :
|b advocacy, governance, and ROI /
|c Catherine Paquet, Warren Saxe.
|
260 |
|
|
|a Indianapolis, Ind. :
|b Cisco Press,
|c ©2005.
|
300 |
|
|
|a 1 online resource (xxiii, 381 pages) :
|b illustrations.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a Network business series
|
500 |
|
|
|a "Understand the total cost of ownership and return on investment for network security solutions."
|
500 |
|
|
|a Includes index.
|
505 |
0 |
0 |
|g Ch. 1.
|t Hackers and threats --
|g Ch. 2.
|t Crucial need for security : vulnerabilities and attacks --
|g Ch. 3.
|t Security technology and related equipment --
|g Ch. 4.
|t Putting it all together : threats and security equipment --
|g Ch. 5.
|t Policy, personnel, and equipment as security enablers --
|g Ch. 6.
|t matter of governance : taking security to the board --
|g Ch. 7.
|t Creating demand for the security proposal : IT management's role --
|g Ch. 8.
|t Risk aversion and security topologies --
|g Ch. 9.
|t Return on prevention : investing in capital assets --
|g Ch. 10.
|t Essential elements of security policy development --
|g Ch. 11.
|t Security is a living process --
|g App.
|t OSI model, Internet protocol, and packets --
|g App.
|t Quick guides to security technologies --
|g App.
|t Return on prevention calculations reference sheets.
|
506 |
|
|
|3 Use copy
|f Restrictions unspecified
|2 star
|5 MiAaHDL
|
533 |
|
|
|a Electronic reproduction.
|b [S.l.] :
|c HathiTrust Digital Library,
|d 2011.
|5 MiAaHDL
|
538 |
|
|
|a Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.
|u http://purl.oclc.org/DLF/benchrepro0212
|5 MiAaHDL
|
583 |
1 |
|
|a digitized
|c 2011
|h HathiTrust Digital Library
|l committed to preserve
|2 pda
|5 MiAaHDL
|
546 |
|
|
|a English.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Computer security
|z United States
|x Management.
|
650 |
|
0 |
|a Data protection.
|
650 |
|
0 |
|a Data protection
|x Management.
|
650 |
|
2 |
|a Computer Security
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Sécurité informatique
|z États-Unis
|x Gestion.
|
650 |
|
6 |
|a Protection de l'information (Informatique)
|
650 |
|
6 |
|a Protection de l'information (Informatique)
|x Gestion.
|
650 |
|
7 |
|a Computer networks
|x Security measures.
|2 fast
|0 (OCoLC)fst00872341
|
650 |
|
7 |
|a Computer security.
|2 fast
|0 (OCoLC)fst00872484
|
650 |
|
7 |
|a Computer security
|x Management.
|2 fast
|0 (OCoLC)fst00872493
|
650 |
|
7 |
|a Data protection.
|2 fast
|0 (OCoLC)fst00887958
|
651 |
|
7 |
|a United States.
|2 fast
|0 (OCoLC)fst01204155
|
650 |
|
7 |
|a Computersicherheit
|2 gnd
|
650 |
|
7 |
|a Netzwerk
|2 gnd
|
650 |
|
7 |
|a Electrical & Computer Engineering.
|2 hilcc
|
650 |
|
7 |
|a Engineering & Applied Sciences.
|2 hilcc
|
650 |
|
7 |
|a Telecommunications.
|2 hilcc
|
700 |
1 |
|
|a Saxe, Warren.
|
776 |
0 |
8 |
|i Print version:
|z 1587201216
|w (DLC) 2003115153
|w (OCoLC)57556821
|
830 |
|
0 |
|a Network business series.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/1587201216/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 14851130
|
938 |
|
|
|a Internet Archive
|b INAR
|n businesscaseforn0000paqu
|
994 |
|
|
|a 92
|b IZTAP
|