Cargando…

Network security architectures /

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Convery, Sean
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Indianapolis, IN : Cisco Press, ©2004.
Colección:Cisco Press networking technology series.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Ia 4500
001 OR_ocm60546616
003 OCoLC
005 20231017213018.0
006 m o d
007 cr unu||||||||
008 050602s2004 inua obd 001 0 eng d
010 |z  2004561123 
040 |a OCL  |b eng  |e pn  |c OCL  |d OCLCQ  |d VLB  |d OCLCQ  |d CEF  |d C6I  |d MBB  |d TXM  |d OCLCQ  |d OCLCF  |d OCLCQ  |d YDX  |d UIU  |d WYU  |d AU@  |d VT2  |d OCLCO  |d OCLCQ 
019 |a 692721173  |a 748094840  |a 1019733270  |a 1044267936  |a 1056385313  |a 1061015893  |a 1064150086  |a 1075531893  |a 1103267209  |a 1129331359 
020 |z 158705115X 
020 |a 9781587051159 
020 |a 158705115X 
035 |a (OCoLC)60546616  |z (OCoLC)692721173  |z (OCoLC)748094840  |z (OCoLC)1019733270  |z (OCoLC)1044267936  |z (OCoLC)1056385313  |z (OCoLC)1061015893  |z (OCoLC)1064150086  |z (OCoLC)1075531893  |z (OCoLC)1103267209  |z (OCoLC)1129331359 
050 4 |a TK5105.59  |b .C66 2004 
082 0 4 |a 651.84404  |b C766n 
049 |a UAMI 
100 1 |a Convery, Sean. 
245 1 0 |a Network security architectures /  |c Sean Convery. 
260 |a Indianapolis, IN :  |b Cisco Press,  |c ©2004. 
300 |a 1 online resource (xxxix, 739 pages) :  |b illustrations. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Networking technology series 
500 |a Includes "Glossary of terms" (p. [673]-677). 
504 |a Includes bibliographical references and index. 
505 0 |a pt. I. Network security foundations -- Network security axioms -- Security policy and operations life cycle -- Secure networking threats --Network security technologies -- pt. II. Designing secure networks -- Device hardening -- General design considerations -- Network security platform options and best deployment practices -- Common application design considerations -- Identity design considerations -- IPsec VPN design considerations -- Supporting-technology design considerations -- Designing your security system -- pt. III. Secure network designs -- Edge security design -- Campus security design -- Teleworker security design -- pt. IV. Network management, case studies, and conclusions -- Secure network management and network security management -- Case studies -- Conclusions. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer networks  |x Security measures. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 7 |a Computer networks  |x Security measures.  |2 fast  |0 (OCoLC)fst00872341 
776 0 8 |i Print version:  |z 158705115X  |w (DLC) 2004561123  |w (OCoLC)55100923 
830 0 |a Cisco Press networking technology series. 
856 4 0 |u https://learning.oreilly.com/library/view/~/158705115X/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a YBP Library Services  |b YANK  |n 14851140 
994 |a 92  |b IZTAP