Cargando…

The Practice of Network Security : Deployment Strategies for Production Environments.

Annotation

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Liska, Allan (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: E Rutherford : Old Tappan : Prentice Hall PTR, Pearson Education [distributor] Dec. 2002 ;
Colección:Prentice Hall series in computer networking and distributed systems.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Mi 4500
001 OR_on1062893686
003 OCoLC
005 20231017213018.0
006 m o d
007 cr |n|||||||||
008 020625e20021226njua o 000 0 eng d
040 |a WYU  |b eng  |e pn  |c WYU  |d OCLCO  |d OCLCQ  |d CEF  |d OCLCO  |d VT2  |d OCLCF  |d OCLCQ  |d OCLCO  |d OCLCQ 
019 |a 1103265489 
020 |a 0130462233 
020 |a 9780130462237 
020 |z 9780130462237 
020 |z 0130462233  |q (Trade Paper) 
024 1 |a 076092018896 
024 3 |a 9780130462237 
029 1 |a AU@  |b 000067095691 
035 |a (OCoLC)1062893686  |z (OCoLC)1103265489 
037 |b 00021483 
050 4 |a TK5105.59.L58 2003 
082 0 4 |a 005.8  |2 21 
049 |a UAMI 
100 1 |a Liska, Allan,  |e author. 
240 1 0 |a Practice of Network Security (Online) 
245 1 4 |a The Practice of Network Security :  |b Deployment Strategies for Production Environments. 
260 |a E Rutherford :  |b Prentice Hall PTR,  |c Dec. 2002 ;  |a Old Tappan :  |b Pearson Education [distributor] 
300 |a 1 online resource (416 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Prentice-Hall Series in Computer Networking and Distributed Systems 
520 8 |a Annotation  |b In The Practice of Network Security, former UUNet networkarchitect Allan Liska shows how to secure enterprise networks in thereal world - where you're constantly under attack and you don't alwaysget the support you need. Liska addresses every facet of networksecurity, including defining security models, access control, Web/DNS/email security, remote access and VPNs, wireless LAN/WANsecurity, monitoring, logging, attack response, and more. Includes adetailed case study on redesigning an insecure enterprise network formaximum security. 
521 |a Scholarly & Professional  |b Prentice Hall PTR. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer networks  |x Security measures. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 7 |a Computer networks  |x Security measures.  |2 fast  |0 (OCoLC)fst00872341 
776 0 8 |i Print version:  |a Liska, Allan.  |s Practice of Network Security (Online).  |t Practice of Network Security.  |d E Rutherford : Prentice Hall PTR, Dec. 2002 ; Old Tappan : Pearson Education [distributor]  |w (DLC) 2003050442 
830 0 |a Prentice Hall series in computer networking and distributed systems. 
856 4 0 |u https://learning.oreilly.com/library/view/~/0130462233/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
994 |a 92  |b IZTAP