Cargando…

Inside network security assessment : guarding your IT infrastructure /

As an IT professional, you need to know how to perform network security assessments. Inside Network Security Assessment: Guarding Your IT Infrastructure is a collection of utilities and templates that will take you through the assessment process. Written by two highly qualified authors with close ti...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Gregg, Michael (Michael C.)
Otros Autores: Kim, David (Information technology security consultant)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Indianapolis, Ind. : Sams, 2005.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Ia 4500
001 OR_ocm64549896
003 OCoLC
005 20231017213018.0
006 m o d
007 cr unu||||||||
008 060306s2005 inu o 001 0 eng d
040 |a UMI  |b eng  |e pn  |c UMI  |d BAKER  |d OCLCQ  |d OCLCG  |d CEF  |d OCLCQ  |d DEBSZ  |d OCLCQ  |d OCLCO  |d WAU  |d OCLCQ  |d AU@  |d IDEBK  |d OCLCQ  |d OCLCA  |d OCLCQ  |d OCLCF  |d CNCEN  |d OCLCO  |d OCLCQ 
019 |a 847679431 
020 |a 0672328097 
020 |a 9780672328091 
029 1 |a AU@  |b 000051495603 
029 1 |a DEBSZ  |b 355373785 
029 1 |a GBVCP  |b 617235902 
029 1 |a HEBIS  |b 291446884 
035 |a (OCoLC)64549896  |z (OCoLC)847679431 
037 |a CL0500000001  |b Safari Books Online 
050 4 |a TK5105.59  |b G74 2005 
082 0 4 |a 005.8  |2 22 
049 |a UAMI 
100 1 |a Gregg, Michael  |q (Michael C.) 
245 1 0 |a Inside network security assessment :  |b guarding your IT infrastructure /  |c Michael Gregg, David Kim. 
260 |a Indianapolis, Ind. :  |b Sams,  |c 2005. 
300 |a 1 online resource (312 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
588 0 |a Print version record. 
520 |a As an IT professional, you need to know how to perform network security assessments. Inside Network Security Assessment: Guarding Your IT Infrastructure is a collection of utilities and templates that will take you through the assessment process. Written by two highly qualified authors with close ties to the International Information Systems Security Certification Consortium, this book was developed with the goal of being a text for the CISSP continuing education class on Network Security Assessment. You will be provided with step-by-step training on assessing security, from paperwork to penetration testing to ethical hacking. The supporting website will also provide you with access to a variety of tools, checklists, and templates to make your job even easier. You'll save everyone time and money by learning to perform security assessments yourself with the help of Inside Network Security Assessment . 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer security  |x Evaluation  |x Methodology. 
650 0 |a Computer networks  |x Security measures. 
650 6 |a Sécurité informatique  |x Évaluation  |x Méthodologie. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 7 |a Computer security  |x Evaluation  |x Methodology.  |2 blmlsh 
650 7 |a Computer networks  |x Security measures.  |2 blmlsh 
650 7 |a Computer networks  |x Security measures.  |2 fast  |0 (OCoLC)fst00872341 
700 1 |a Kim, David  |c (Information technology security consultant) 
856 4 0 |u https://learning.oreilly.com/library/view/~/0672328097/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Baker & Taylor  |b BKTY  |c 39.99  |d 29.99  |i 0672328097  |n 0006500200  |s active 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n cis23912014 
994 |a 92  |b IZTAP