|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
OR_ocn317877861 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
090406s2009 caua o 001 0 eng d |
040 |
|
|
|a UMI
|b eng
|e pn
|c UMI
|d OCLCQ
|d CEF
|d OCLCQ
|d EBLCP
|d YDXCP
|d OCLCQ
|d DEBSZ
|d E7B
|d OCLCF
|d OCLCQ
|d COO
|d C6I
|d IDEBK
|d OCLCQ
|d FEM
|d OCLCQ
|d MOQ
|d DKU
|d UAB
|d AU@
|d OCLCQ
|d UKAHL
|d OCLCQ
|d LVT
|d OCLCO
|d OCLCQ
|
019 |
|
|
|a 609840942
|a 617958117
|a 968044077
|a 968989006
|a 1302263438
|
020 |
|
|
|a 9780596157944
|
020 |
|
|
|a 0596157940
|
020 |
|
|
|a 9780596555450
|q (electronic bk.)
|
020 |
|
|
|a 0596555458
|q (electronic bk.)
|
029 |
1 |
|
|a CHBIS
|b 006151283
|
029 |
1 |
|
|a CHVBK
|b 171255461
|
029 |
1 |
|
|a DEBSZ
|b 355420449
|
029 |
1 |
|
|a DEBSZ
|b 396273513
|
029 |
1 |
|
|a HEBIS
|b 291492231
|
035 |
|
|
|a (OCoLC)317877861
|z (OCoLC)609840942
|z (OCoLC)617958117
|z (OCoLC)968044077
|z (OCoLC)968989006
|z (OCoLC)1302263438
|
037 |
|
|
|a CL0500000037
|b Safari Books Online
|
050 |
|
4 |
|a TK5105.59
|b .F79 2009
|
082 |
0 |
4 |
|a 005.8
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Fry, Chris.
|
245 |
1 |
0 |
|a Security monitoring /
|c by Chris Fry, Martin Nystrom.
|
250 |
|
|
|a 1st ed.
|
260 |
|
|
|a Sebastopol, Calif. :
|b O'Reilly Media, Inc.,
|c ©2009.
|
300 |
|
|
|a 1 online resource (1 volume (unpaged)) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
|
|a Security Monitoring; What This Book Is; Conventions Used in This Book; Using Code Examples; Safari® Books Online; Comments and Questions; Acknowledgments; 1. Getting Started; Why Monitor?; Insider Threats; Challenges to Monitoring; Operational Realities; Volume; Privacy Concerns; Outsourcing Your Security Monitoring; Monitoring to Minimize Risk; Policy-Based Monitoring; Why Should This Work for You?; Open Source Versus Commercial Products; Introducing Blanco Wireless; 2. Implement Policies for Monitoring; Anomaly Monitoring; Policy Monitoring; Monitoring Against Defined Policies.
|
520 |
|
|
|a How well does your enterprise stand up against today's sophisticated security threats? In this book, security experts from Cisco Systems demonstrate how to detect damaging security incidents on your global network -- first by teaching you which assets you need to monitor closely, and then by helping you develop targeted strategies and pragmatic techniques to protect them. These recommendations will help you select and deploy the very best tools to monitor your own enterprise network.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
1 |
7 |
|a Computer networks
|x Security measures.
|2 bisacsh
|
650 |
|
7 |
|a Computer networks
|x Security measures.
|2 blmlsh
|
650 |
|
7 |
|a Computer networks
|x Security measures.
|2 fast
|0 (OCoLC)fst00872341
|
700 |
1 |
|
|a Nystrom, Martin.
|
776 |
1 |
|
|z 9780596518165
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9780596157944/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH13752592
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL443189
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr10762386
|
938 |
|
|
|a ProQuest MyiLibrary Digital eBook Collection
|b IDEB
|n cis28426796
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 3180009
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 7462399
|
994 |
|
|
|a 92
|b IZTAP
|