Security sage's guide to hardening the network infrastructure /
Security Sage's Guide to Hardening the Network Infrastructure focuses on both perimeter and internal networks, giving IT and security administrators a complete picture of how they should design and protect their enterprises. Other books may concentrate on perimeter security or host configuratio...
Clasificación: | Libro Electrónico |
---|---|
Otros Autores: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Rockland, MA :
Syngress Pub.,
�2004.
�2004 |
Temas: | |
Acceso en línea: | Texto completo |
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | SCIDIR_ocm54985361 | ||
003 | OCoLC | ||
005 | 20231117015034.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 040420s2004 mau o 000 0 eng d | ||
040 | |a N$T |b eng |e pn |c N$T |d OCLCQ |d B24X7 |d OCLCQ |d EBLCP |d MERUC |d OPELS |d CCO |d E7B |d VVN |d NTG |d BMU |d YDXCP |d IDEBK |d NRU |d DKDLA |d ZCU |d OCLCO |d FVL |d OCLCF |d OCLCQ |d UKDOC |d OCLCQ |d DEBSZ |d UMI |d OCLCQ |d KSU |d AZK |d LOA |d DEBBG |d AGLDB |d MOR |d PLS |d PIFBR |d LIV |d OCLCQ |d SAV |d U3W |d STF |d BRL |d WRM |d D6H |d OCLCQ |d VTS |d CEF |d NRAMU |d CRU |d ICG |d OCLCQ |d INT |d VT2 |d OCLCQ |d COO |d WYU |d G3B |d TKN |d OCLCQ |d LEAUB |d DKC |d OCLCQ |d OL$ |d OCLCQ |d K6U |d INARC |d OCLCO |d OCLCQ |d OCLCO | ||
019 | |a 56072878 |a 62476277 |a 85840953 |a 162598560 |a 191035011 |a 478247356 |a 507548152 |a 559259650 |a 647322564 |a 722222974 |a 728014400 |a 823829670 |a 823899375 |a 824090648 |a 824138261 |a 856952157 |a 888488562 |a 933930936 |a 961523284 |a 962657310 |a 1037490309 |a 1055366890 |a 1081252292 |a 1152983399 |a 1228586692 | ||
020 | |a 1931836337 |q (electronic bk.) | ||
020 | |a 9781931836333 |q (electronic bk.) | ||
020 | |a 9781931836012 | ||
020 | |a 1931836019 | ||
020 | |a 0080480837 | ||
020 | |a 9780080480831 | ||
020 | |a 1281052620 | ||
020 | |a 9781281052629 | ||
024 | 3 | |a 9781931836012 | |
035 | |a (OCoLC)54985361 |z (OCoLC)56072878 |z (OCoLC)62476277 |z (OCoLC)85840953 |z (OCoLC)162598560 |z (OCoLC)191035011 |z (OCoLC)478247356 |z (OCoLC)507548152 |z (OCoLC)559259650 |z (OCoLC)647322564 |z (OCoLC)722222974 |z (OCoLC)728014400 |z (OCoLC)823829670 |z (OCoLC)823899375 |z (OCoLC)824090648 |z (OCoLC)824138261 |z (OCoLC)856952157 |z (OCoLC)888488562 |z (OCoLC)933930936 |z (OCoLC)961523284 |z (OCoLC)962657310 |z (OCoLC)1037490309 |z (OCoLC)1055366890 |z (OCoLC)1081252292 |z (OCoLC)1152983399 |z (OCoLC)1228586692 | ||
050 | 4 | |a TK5105.59 |b S43 2004eb | |
072 | 7 | |a COM |x 060040 |2 bisacsh | |
072 | 7 | |a COM |x 043050 |2 bisacsh | |
072 | 7 | |a COM |x 053000 |2 bisacsh | |
072 | 7 | |a UTN |2 bicssc | |
082 | 0 | 4 | |a 005.8 |2 22 |
245 | 0 | 0 | |a Security sage's guide to hardening the network infrastructure / |c Steven Andr�es [and others] ; foreword by Erik Pace Birkholz. |
246 | 3 | 0 | |a Hardening the network infrastructure |
260 | |a Rockland, MA : |b Syngress Pub., |c �2004. | ||
264 | 4 | |c �2004 | |
300 | |a 1 online resource | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a data file | ||
500 | |a Title from e-book title screen (viewed Apr 20, 2004). | ||
505 | 0 | |a Cover; Contents; Foreword; Defining Perimeter and Internal Segments; Assessing Your Current Networks; Selecting the Correct Firewall; Firewall Manipulation: Attacks and Defenses; Routing Devices and Protocols; Secure Network Management; Network Switching; Defending Routers and Switches; Implementing Intrusion Detection Systems; Perimeter Network Design; Internal Network Design; Index; Related Titles. | |
520 | |a Security Sage's Guide to Hardening the Network Infrastructure focuses on both perimeter and internal networks, giving IT and security administrators a complete picture of how they should design and protect their enterprises. Other books may concentrate on perimeter security or host configuration yet ignore the infrastructure connecting the two. While others tend to focus on theory and basic security background, this publication will dive right into the content and help provide real solutions to common IT security problems. | ||
650 | 0 | |a Computer networks |x Security measures. | |
650 | 6 | |a R�eseaux d'ordinateurs |x S�ecurit�e |x Mesures. |0 (CaQQLa)201-0263812 | |
650 | 7 | |a COMPUTERS |x Internet |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Networking |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh | |
650 | 7 | |a Computer networks |x Security measures |2 fast |0 (OCoLC)fst00872341 | |
700 | 1 | |a Andr�es, Steven. | |
776 | 0 | 8 | |i Print version: |a Andr�es, Steven. |t Security Sage's guide to hardening the network infrastructure. |d Rockland, MA : Syngress, �2004 |z 9781931836012 |w (OCoLC)55522053 |
856 | 4 | 0 | |u https://sciencedirect.uam.elogim.com/science/book/9781931836012 |z Texto completo |