Cargando…

Network security bible /

"Network security is constantly evolving, and this comprehensive guide has been thoroughly updated to cover the newest developments. If you are responsible for network security, this is the reference you need at your side. Covering new techniques, technology, and methods for approaching securit...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Cole, Eric
Otros Autores: Krutz, Ronald L., 1938-, Conley, James W.
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Indianapolis, Ind. : Wiley Pub., ©2009.
Edición:2nd ed.
Colección:Bible.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Ia 4500
001 OR_ocn608494796
003 OCoLC
005 20231017213018.0
006 m o d
007 cr unu||||||||
008 100422s2009 inua o 001 0 eng d
010 |a  2009933372 
040 |a UMI  |b eng  |e pn  |c UMI  |d CEF  |d UBF  |d OCLCQ  |d NHM  |d DEBSZ  |d STF  |d B24X7  |d OCLCQ  |d OCLCF  |d OCLCQ  |d CDX  |d COO  |d IDEBK  |d OTZ  |d YDXCP  |d OCLCQ  |d LND  |d OCLCQ  |d Z5A  |d OCLCQ  |d OCLCA  |d AU@  |d OCLCQ  |d WYU  |d VT2  |d UHL  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO 
015 |a GBA967081  |2 bnb 
015 |a 015-30747  |2 bnb 
016 7 |a 015307472  |2 Uk 
019 |a 500808632  |a 726601647  |a 765143981  |a 779427021  |a 781260960  |a 1038387990  |a 1058681148  |a 1060197823  |a 1064123659  |a 1103263931  |a 1113799863  |a 1129364288 
020 |a 0470502495 
020 |a 9780470502495 
020 |a 9780470569993 
020 |a 0470569999 
020 |a 9786612303487  |q (electronic bk.) 
020 |a 6612303484 
020 |z 9780470502495 
029 1 |a AU@  |b 000062332394 
029 1 |a CDX  |b 10953460 
029 1 |a DEBSZ  |b 355416247 
029 1 |a NZ1  |b 14520093 
035 |a (OCoLC)608494796  |z (OCoLC)500808632  |z (OCoLC)726601647  |z (OCoLC)765143981  |z (OCoLC)779427021  |z (OCoLC)781260960  |z (OCoLC)1038387990  |z (OCoLC)1058681148  |z (OCoLC)1060197823  |z (OCoLC)1064123659  |z (OCoLC)1103263931  |z (OCoLC)1113799863  |z (OCoLC)1129364288 
037 |a CL0500000064  |b Safari Books Online 
050 4 |a QA76.9.A25  |b C5985 2009 
082 0 4 |a 005.8  |2 22 
049 |a UAMI 
100 1 |a Cole, Eric. 
245 1 0 |a Network security bible /  |c Eric Cole, Ronald Krutz, James W. Conley. 
250 |a 2nd ed. 
260 |a Indianapolis, Ind. :  |b Wiley Pub.,  |c ©2009. 
300 |a 1 online resource (xliv, 891 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Bible ;  |v v. 657 
520 |a "Network security is constantly evolving, and this comprehensive guide has been thoroughly updated to cover the newest developments. If you are responsible for network security, this is the reference you need at your side. Covering new techniques, technology, and methods for approaching security, it also examines new trends and best practices being used by many organizations. The revised Network Security Bible complements the Cisco Academy course instruction in networking security"--Resource description page. 
588 0 |a Print version record. 
505 0 |a pt. I. Network Security Landscape -- Ch. 1. State of Network Security -- Ch. 2. New Approaches to Cyber Security -- Ch. 3. Interfacing with the Organization -- pt. II. Security Principles and Practices -- Ch. 4. Information System Security Principles -- Ch. 5. Information System Security Management -- Ch. 6. Access Control -- Ch. 7. Attacks and Threats -- pt. III. Operating Systems and Applications -- Ch. 8. Windows Security -- Ch. 9. UNIX and Linux Security -- Ch. 10. Web Browser and Client Security -- Ch. 11. Web Security -- Ch. 12. Electronic mail (E-mail) Security -- Ch. 13. Domain Name System -- Ch. 14. Server Security -- pt. IV. Network Security Fundamentals -- Ch. 15. Network Protocols -- Ch. 16. Wireless Security -- Ch. 17. Network Architecture Fundamentals -- Ch. 18. Firewalls -- Ch. 19. Intrusion Detection/Prevention -- pt. V. Communication -- Ch. 20. Secret Communication -- Ch. 21. Covert Communication -- Ch. 22. Applications of Secure/Covert Communication -- pt. VI. The Security Threat and Response -- Ch. 23. Intrusion Detection and Response -- Ch. 24. Digital Forensics -- Ch. 25. Security Assessments, Testing, and Evaluation -- pt. VII. Integrated Cyber Security -- Ch. 26. Validating Your Security -- Ch. 27. Data Protection -- Ch. 28. Putting Everything Together -- Ch. 29. The Future. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer security. 
650 0 |a Computer networks  |x Security measures. 
650 6 |a Sécurité informatique. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 7 |a Computer security.  |2 blmlsh 
650 7 |a Computer networks  |x Security measures.  |2 blmlsh 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Computer security  |2 fast 
700 1 |a Krutz, Ronald L.,  |d 1938- 
700 1 |a Conley, James W. 
776 0 8 |i Print version:  |a Cole, Eric.  |t Network security bible.  |d Indianapolis, IN : Wiley ; Chichester : John Wiley [distributor], ©2009  |z 9780470502495  |w (DLC) 2009933372  |w (OCoLC)423589883 
830 0 |a Bible. 
856 4 0 |u https://learning.oreilly.com/library/view/~/9780470502495/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Books 24x7  |b B247  |n bks00040753 
938 |a Coutts Information Services  |b COUT  |n 10953460 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n 230348 
938 |a YBP Library Services  |b YANK  |n 12666838 
994 |a 92  |b IZTAP