|
|
|
|
LEADER |
00000cam a2200000Ia 4500 |
001 |
OR_ocm60546616 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
050602s2004 inua obd 001 0 eng d |
010 |
|
|
|z 2004561123
|
040 |
|
|
|a OCL
|b eng
|e pn
|c OCL
|d OCLCQ
|d VLB
|d OCLCQ
|d CEF
|d C6I
|d MBB
|d TXM
|d OCLCQ
|d OCLCF
|d OCLCQ
|d YDX
|d UIU
|d WYU
|d AU@
|d VT2
|d OCLCO
|d OCLCQ
|
019 |
|
|
|a 692721173
|a 748094840
|a 1019733270
|a 1044267936
|a 1056385313
|a 1061015893
|a 1064150086
|a 1075531893
|a 1103267209
|a 1129331359
|
020 |
|
|
|z 158705115X
|
020 |
|
|
|a 9781587051159
|
020 |
|
|
|a 158705115X
|
035 |
|
|
|a (OCoLC)60546616
|z (OCoLC)692721173
|z (OCoLC)748094840
|z (OCoLC)1019733270
|z (OCoLC)1044267936
|z (OCoLC)1056385313
|z (OCoLC)1061015893
|z (OCoLC)1064150086
|z (OCoLC)1075531893
|z (OCoLC)1103267209
|z (OCoLC)1129331359
|
050 |
|
4 |
|a TK5105.59
|b .C66 2004
|
082 |
0 |
4 |
|a 651.84404
|b C766n
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Convery, Sean.
|
245 |
1 |
0 |
|a Network security architectures /
|c Sean Convery.
|
260 |
|
|
|a Indianapolis, IN :
|b Cisco Press,
|c ©2004.
|
300 |
|
|
|a 1 online resource (xxxix, 739 pages) :
|b illustrations.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a Networking technology series
|
500 |
|
|
|a Includes "Glossary of terms" (p. [673]-677).
|
504 |
|
|
|a Includes bibliographical references and index.
|
505 |
0 |
|
|a pt. I. Network security foundations -- Network security axioms -- Security policy and operations life cycle -- Secure networking threats --Network security technologies -- pt. II. Designing secure networks -- Device hardening -- General design considerations -- Network security platform options and best deployment practices -- Common application design considerations -- Identity design considerations -- IPsec VPN design considerations -- Supporting-technology design considerations -- Designing your security system -- pt. III. Secure network designs -- Edge security design -- Campus security design -- Teleworker security design -- pt. IV. Network management, case studies, and conclusions -- Secure network management and network security management -- Case studies -- Conclusions.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a Computer networks
|x Security measures.
|2 fast
|0 (OCoLC)fst00872341
|
776 |
0 |
8 |
|i Print version:
|z 158705115X
|w (DLC) 2004561123
|w (OCoLC)55100923
|
830 |
|
0 |
|a Cisco Press networking technology series.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/158705115X/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 14851140
|
994 |
|
|
|a 92
|b IZTAP
|