|
|
|
|
LEADER |
00000cam a2200000Ia 4500 |
001 |
OR_ocn608494796 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
100422s2009 inua o 001 0 eng d |
010 |
|
|
|a 2009933372
|
040 |
|
|
|a UMI
|b eng
|e pn
|c UMI
|d CEF
|d UBF
|d OCLCQ
|d NHM
|d DEBSZ
|d STF
|d B24X7
|d OCLCQ
|d OCLCF
|d OCLCQ
|d CDX
|d COO
|d IDEBK
|d OTZ
|d YDXCP
|d OCLCQ
|d LND
|d OCLCQ
|d Z5A
|d OCLCQ
|d OCLCA
|d AU@
|d OCLCQ
|d WYU
|d VT2
|d UHL
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|
015 |
|
|
|a GBA967081
|2 bnb
|
015 |
|
|
|a 015-30747
|2 bnb
|
016 |
7 |
|
|a 015307472
|2 Uk
|
019 |
|
|
|a 500808632
|a 726601647
|a 765143981
|a 779427021
|a 781260960
|a 1038387990
|a 1058681148
|a 1060197823
|a 1064123659
|a 1103263931
|a 1113799863
|a 1129364288
|
020 |
|
|
|a 0470502495
|
020 |
|
|
|a 9780470502495
|
020 |
|
|
|a 9780470569993
|
020 |
|
|
|a 0470569999
|
020 |
|
|
|a 9786612303487
|q (electronic bk.)
|
020 |
|
|
|a 6612303484
|
020 |
|
|
|z 9780470502495
|
029 |
1 |
|
|a AU@
|b 000062332394
|
029 |
1 |
|
|a CDX
|b 10953460
|
029 |
1 |
|
|a DEBSZ
|b 355416247
|
029 |
1 |
|
|a NZ1
|b 14520093
|
035 |
|
|
|a (OCoLC)608494796
|z (OCoLC)500808632
|z (OCoLC)726601647
|z (OCoLC)765143981
|z (OCoLC)779427021
|z (OCoLC)781260960
|z (OCoLC)1038387990
|z (OCoLC)1058681148
|z (OCoLC)1060197823
|z (OCoLC)1064123659
|z (OCoLC)1103263931
|z (OCoLC)1113799863
|z (OCoLC)1129364288
|
037 |
|
|
|a CL0500000064
|b Safari Books Online
|
050 |
|
4 |
|a QA76.9.A25
|b C5985 2009
|
082 |
0 |
4 |
|a 005.8
|2 22
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Cole, Eric.
|
245 |
1 |
0 |
|a Network security bible /
|c Eric Cole, Ronald Krutz, James W. Conley.
|
250 |
|
|
|a 2nd ed.
|
260 |
|
|
|a Indianapolis, Ind. :
|b Wiley Pub.,
|c ©2009.
|
300 |
|
|
|a 1 online resource (xliv, 891 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a Bible ;
|v v. 657
|
520 |
|
|
|a "Network security is constantly evolving, and this comprehensive guide has been thoroughly updated to cover the newest developments. If you are responsible for network security, this is the reference you need at your side. Covering new techniques, technology, and methods for approaching security, it also examines new trends and best practices being used by many organizations. The revised Network Security Bible complements the Cisco Academy course instruction in networking security"--Resource description page.
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
|
|a pt. I. Network Security Landscape -- Ch. 1. State of Network Security -- Ch. 2. New Approaches to Cyber Security -- Ch. 3. Interfacing with the Organization -- pt. II. Security Principles and Practices -- Ch. 4. Information System Security Principles -- Ch. 5. Information System Security Management -- Ch. 6. Access Control -- Ch. 7. Attacks and Threats -- pt. III. Operating Systems and Applications -- Ch. 8. Windows Security -- Ch. 9. UNIX and Linux Security -- Ch. 10. Web Browser and Client Security -- Ch. 11. Web Security -- Ch. 12. Electronic mail (E-mail) Security -- Ch. 13. Domain Name System -- Ch. 14. Server Security -- pt. IV. Network Security Fundamentals -- Ch. 15. Network Protocols -- Ch. 16. Wireless Security -- Ch. 17. Network Architecture Fundamentals -- Ch. 18. Firewalls -- Ch. 19. Intrusion Detection/Prevention -- pt. V. Communication -- Ch. 20. Secret Communication -- Ch. 21. Covert Communication -- Ch. 22. Applications of Secure/Covert Communication -- pt. VI. The Security Threat and Response -- Ch. 23. Intrusion Detection and Response -- Ch. 24. Digital Forensics -- Ch. 25. Security Assessments, Testing, and Evaluation -- pt. VII. Integrated Cyber Security -- Ch. 26. Validating Your Security -- Ch. 27. Data Protection -- Ch. 28. Putting Everything Together -- Ch. 29. The Future.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a Computer security.
|2 blmlsh
|
650 |
|
7 |
|a Computer networks
|x Security measures.
|2 blmlsh
|
650 |
|
7 |
|a Computer networks
|x Security measures
|2 fast
|
650 |
|
7 |
|a Computer security
|2 fast
|
700 |
1 |
|
|a Krutz, Ronald L.,
|d 1938-
|
700 |
1 |
|
|a Conley, James W.
|
776 |
0 |
8 |
|i Print version:
|a Cole, Eric.
|t Network security bible.
|d Indianapolis, IN : Wiley ; Chichester : John Wiley [distributor], ©2009
|z 9780470502495
|w (DLC) 2009933372
|w (OCoLC)423589883
|
830 |
|
0 |
|a Bible.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9780470502495/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Books 24x7
|b B247
|n bks00040753
|
938 |
|
|
|a Coutts Information Services
|b COUT
|n 10953460
|
938 |
|
|
|a ProQuest MyiLibrary Digital eBook Collection
|b IDEB
|n 230348
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 12666838
|
994 |
|
|
|a 92
|b IZTAP
|