It looks like you're offline.
Open Library logo
additional options menu

MARC record from Internet Archive

LEADER: 03865cam 2200577 a 4500
001 ocm41437872
003 OCoLC
005 20181212020030.0
008 980122s1999 inua b 001 0 eng d
010 $a 98084218
040 $aNTK$beng$cDLC$dNTK$dIQU$dUKM$dLVB$dYDXCP$dEXW$dZWZ$dOCLCF$dOCLCQ$dOCLCA$dMST$dOCLCQ
015 $aGB9950384$2bnb
019 $a41833514
020 $a1578700434$q(pbk.)
020 $a9781578700431$q(pbk.)
035 $a(OCoLC)41437872$z(OCoLC)41833514
042 $alccopycat
050 00 $aTK5105.59$b.K34 1999
082 00 $a005.8$221
100 1 $aKaeo, Merike.
245 10 $aDesigning network security /$cMerike Kaeo.
246 1 $iSubtitle on cover:$aPractical guide to creating a secure network infrastructure
260 $aIndianapolis, Ind. :$bMacmillan Technical Pub.,$c℗♭1999.
300 $axv, 426 pages :$billustrations ;$c23 cm.
336 $atext$btxt$2rdacontent
337 $aunmediated$bn$2rdamedia
338 $avolume$bnc$2rdacarrier
490 1 $aCisco Press fundamentals series
500 $a"Cisco Systems, Cisco Press."
504 $aIncludes bibliographical references (pages 367-369) and index.
505 00 $tSecurity Fundamentals --$tBasic Cryptography --$tCryptography --$tAuthentication and Authorization --$tName Space --$tKey Management --$tKey Escrow --$tSecurity Technologies --$tIdentity Technologies --$tSecurity in TCP/IP Layers --$tVirtual Private Dialup Security Technologies --$tPublic Key Infrastructure and Distribution Models --$tExport Controls on Cryptography --$tHistorical Perspective on U.S. Policy --$tHistorical Perspective on International Policy --$tDigital Signatures --$tThe Corporate Security Policy --$tThreats in an Enterprise Network --$tTypes of Threats --$tMotivation of Threat --$tCommon Vulnerabilities --$tConsiderations for a Site Security Policy --$tWhere to Begin --$tRisk Management --$tA Security Policy Framework --$tDesign and Implementation of the Corporate Security Policy --$tPhysical Security Controls --$tLogical Security Controls --$tInfrastructure and Data Integrity --$tData Confidentiality --$tPolicies and Procedures for Staff --$tSecurity Awareness Training --$tIncident Handling --$tBuilding an Incident Response Team --$tDetecting an Incident --$tHandling an Incident --$tResponding to the Incident --$tRecovering from an Incident --$tPractical Implementation --$tSecuring the Corporate Network Infrastructure --$tIdentity --$tIntegrity --$tData Confidentiality --$tNetwork Availability --$tAudit --$tImplementation Example --$tSecuring Internet Access --$tInternet Access Architecture --$tExternal Screening Router Architecture --$tAdvanced Firewall Architecture --$tImplementation Examples --$tSecuring Dial-In Access --$tDial-In Security Concerns.
650 0 $aComputer networks$xSecurity measures.
650 0 $aInternet$xSecurity measures.
650 0 $aComputer security.
650 6 $aRe seaux d'ordinateurs$xSe curite $xMesures.
650 6 $aSe curite informatique.
650 6 $aProtection de l'information (Informatique)
650 6 $aInternet$xSe curite $xMesures.
650 7 $aComputer networks$xSecurity measures.$2fast$0(OCoLC)fst00872341
650 7 $aComputer security.$2fast$0(OCoLC)fst00872484
650 7 $aInternet$xSecurity measures.$2fast$0(OCoLC)fst01751426
650 7 $aRe seaux d'ordinateurs$xMesures de su rete .$2ram
776 08 $iOnline version:$aKaeo, Merike.$tDesigning network security.$dIndianapolis, IN : Cisco Press : Macmillan Technical Pub., ℗♭1999$w(OCoLC)748988572
830 0 $aCisco Press fundamentals series.
938 $aYBP Library Services$bYANK$n1478988
029 1 $aAU@$b000014225950
029 1 $aHEBIS$b097368857
029 1 $aNZ1$b5264307
029 1 $aYDXCP$b1478988
994 $aZ0$bP4A
948 $hNO HOLDINGS IN P4A - 170 OTHER HOLDINGS