|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
OR_ocn313645670 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr ||||||||||| |
008 |
020122s2002 flua ob 001 0 eng d |
040 |
|
|
|a CEF
|b eng
|e pn
|c CEF
|d OCLCO
|d N$T
|d YDXCP
|d CAI
|d VLB
|d IDEBK
|d E7B
|d OCLCQ
|d MERUC
|d TULIB
|d OCLCQ
|d OCLCF
|d CRCPR
|d OCLCQ
|d OCLCO
|d VVJ
|d OCLCQ
|d OCLCA
|d OCLCQ
|d UAB
|d OCLCQ
|d CEF
|d UKMGB
|d YDX
|d TYFRS
|d LEAUB
|d UKAHL
|d OCLCQ
|d OCLCO
|d OCLCQ
|d SFB
|d OCLCQ
|d OCLCO
|
015 |
|
|
|a GBB7E1973
|2 bnb
|
016 |
7 |
|
|a 018454574
|2 Uk
|
019 |
|
|
|a 61280425
|a 71228239
|a 150388265
|a 276796357
|a 647583645
|a 779918393
|a 1080587492
|a 1087244016
|
020 |
|
|
|a 9781420031461
|q (e-book ;
|q PDF)
|
020 |
|
|
|a 1420031465
|
020 |
|
|
|a 0849312612
|
020 |
|
|
|a 9780849312618
|
020 |
|
|
|a 0429132751
|q (electronic bk.)
|
020 |
|
|
|a 9780429132759
|q (electronic bk.)
|
020 |
|
|
|z 9780849312618
|
029 |
1 |
|
|a AU@
|b 000056798545
|
029 |
1 |
|
|a AU@
|b 000066972100
|
029 |
1 |
|
|a NZ1
|b 11925465
|
029 |
1 |
|
|a NZ1
|b 13337715
|
029 |
1 |
|
|a UKMGB
|b 018454574
|
035 |
|
|
|a (OCoLC)313645670
|z (OCoLC)61280425
|z (OCoLC)71228239
|z (OCoLC)150388265
|z (OCoLC)276796357
|z (OCoLC)647583645
|z (OCoLC)779918393
|z (OCoLC)1080587492
|z (OCoLC)1087244016
|
037 |
|
|
|a TANDF_183192
|b Ingram Content Group
|
050 |
|
4 |
|a QA76.76.O63
|b S55876 2002
|
072 |
|
7 |
|a COM
|x 046000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.4/4769
|2 21
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Simonyi, Michael A.
|
245 |
1 |
0 |
|a Securing Windows NT/2000 :
|b from policies to firewalls /
|c Michael A. Simonyi.
|
260 |
|
|
|a Boca Raton, Fla. :
|b Auerbach,
|c ©2002.
|
300 |
|
|
|a 1 online resource (x, 261 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
504 |
|
|
|a Includes bibliographical references and index.
|
505 |
0 |
|
|a Front Cover; Contents; Preface; 1. Executive Management Overview; 2. What Is Security?; 3. What Is a Security Policy?; 4. Implementing a Security Policy; 5. Perimeter Security Scenarios; 6. Directions in Security; 7. Corporate Security Requirements for Conducting Business over the Internet; 8. Implementing Check Point FireWall-1/VPN-1 with Windows NT and Windows 2000; 9. Enhancing the Security Infrastructure; Appendices; Index.
|
520 |
|
|
|a Doubling as a managerial guide and technical tutorial, this book offers security guidance at various levels. It provides advice on crafting and implementing corporate security policy, and on structuring a project plan. Specific instruction is offered for preparing, installing, and tuning Windows NT/2000 operating systems, readying it for secure use.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
630 |
0 |
0 |
|a Microsoft Windows NT server.
|
630 |
0 |
7 |
|a Microsoft Windows NT server
|2 fast
|
650 |
|
0 |
|a Operating systems (Computers)
|
650 |
|
6 |
|a Systèmes d'exploitation (Ordinateurs)
|
650 |
|
7 |
|a operating systems.
|2 aat
|
650 |
|
7 |
|a COMPUTERS
|x Operating Systems
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Operating systems (Computers)
|2 fast
|
710 |
2 |
|
|a CRC Press.
|
776 |
0 |
8 |
|i Print version:
|a Simonyi, Michael A.
|t Securing Windows NT/2000.
|d Boca Raton, Fla. : Auerbach, ©2002
|z 0849312612
|w (DLC) 2002018888
|w (OCoLC)48871109
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781420031461/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH19671441
|
938 |
|
|
|a CRC Press
|b CRCP
|n AUP0AUE1261PDF
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr10142856
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 154604
|
938 |
|
|
|a ProQuest MyiLibrary Digital eBook Collection
|b IDEB
|n 50008
|
938 |
|
|
|a Taylor & Francis
|b TAFR
|n 9780429132759
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 2467630
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 15920252
|
994 |
|
|
|a 92
|b IZTAP
|