|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
OR_ocm63045461 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr nn||||||||| |
008 |
060118s2003 maua ob 001 0 eng d |
040 |
|
|
|a NTG
|b eng
|e pn
|c NTG
|d WPG
|d COO
|d OCLCQ
|d U5D
|d B24X7
|d OCLCQ
|d UMI
|d OCLCO
|d DEBSZ
|d OCLCO
|d OCLCQ
|d OCLCF
|d YDXCP
|d OCLCO
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|d LIV
|d OCLCQ
|d NLE
|d UKMGB
|d U3G
|d BRF
|d VT2
|d OCLCO
|d OCLCQ
|
015 |
|
|
|a GBA3X3731
|2 bnb
|
015 |
|
|
|a GBB6H3880
|2 bnb
|
016 |
7 |
|
|a 017581993
|2 Uk
|
019 |
|
|
|a 55235020
|a 507257972
|a 606022679
|a 824560367
|a 1153009492
|
020 |
|
|
|a 9780080509075
|
020 |
|
|
|a 008050907X
|
020 |
|
|
|z 1555582982
|
020 |
|
|
|z 9781555582982
|q (pbk.)
|
029 |
1 |
|
|a AU@
|b 000050492790
|
029 |
1 |
|
|a AU@
|b 000053223138
|
029 |
1 |
|
|a DEBBG
|b BV041119957
|
029 |
1 |
|
|a DEBSZ
|b 396678459
|
029 |
1 |
|
|a GBVCP
|b 785366369
|
029 |
1 |
|
|a UKMGB
|b 017581993
|
035 |
|
|
|a (OCoLC)63045461
|z (OCoLC)55235020
|z (OCoLC)507257972
|z (OCoLC)606022679
|z (OCoLC)824560367
|z (OCoLC)1153009492
|
037 |
|
|
|a CL0500000183
|b Safari Books Online
|
050 |
|
4 |
|a TK5105.59
|b .S64 2003b
|
082 |
0 |
4 |
|a 005.8
|2 21
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Speed, Tim.
|
245 |
1 |
0 |
|a Internet security :
|b a jumpstart for systems administrators and IT managers /
|c Tim Speed, Juanita Ellis.
|
260 |
|
|
|a Boston :
|b Digital Press,
|c ©2003.
|
300 |
|
|
|a 1 online resource
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
504 |
|
|
|a Includes bibliographical references and index.
|
505 |
0 |
|
|a The Internet and Security; The Security Review Process; Cryptography; Secure Networks; Protecting Your Intranet from the Extranet and Internet; Authentication and Authorization; E-Commerce: Public Key Infrastructure; Messaging Security; What Are We Doing Here?; Disaster Recovery Appendices: Security Tools; The CERT Report
|
520 |
|
|
|a Internet Security incorporates not only the technology needed to support a solid security strategy but also those policies and processes that must be incorporated in order for that strategy to work. New methods of breaking into corporate networks are resulting in major losses. This book provides the latest information on how to guard against attacks and informs the IT manager of the products that can detect and prevent break-ins. Crucial concepts such as authentication and encryption are explained, enabling the reader to understand when and where these technologies will be useful. Due to the a.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Internet
|x Security measures.
|
650 |
|
0 |
|a Electronic commerce
|x Security measures.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Internet
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Commerce électronique
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a Computer networks
|x Security measures.
|2 fast
|0 (OCoLC)fst00872341
|
650 |
|
7 |
|a Electronic commerce
|x Security measures.
|2 fast
|0 (OCoLC)fst00906919
|
650 |
|
7 |
|a Internet
|x Security measures.
|2 fast
|0 (OCoLC)fst01751426
|
700 |
1 |
|
|a Ellis, Juanita.
|
776 |
0 |
8 |
|i Print version:
|a Speed, Tim.
|t Internet security.
|d Amsterdam ; London : Digital Press, ©2003
|z 1555582982
|w (DLC) 2003279708
|w (OCoLC)53896812
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781555582982/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Books 24x7
|b B247
|n bks00003059
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 2636673
|
994 |
|
|
|a 92
|b IZTAP
|