Record ID | ia:internetsecurity0000spee |
Source | Internet Archive |
Download MARC XML | https://archive.org/download/internetsecurity0000spee/internetsecurity0000spee_marc.xml |
Download MARC binary | https://www.archive.org/download/internetsecurity0000spee/internetsecurity0000spee_meta.mrc |
LEADER: 05800cam 2200877Ia 4500
001 ocn174142945
003 OCoLC
005 20191216182042.0
008 071015s2003 ne a ob 001 0 eng d
006 m o d
007 cr cnu---unuuu
040 $aN$T$beng$epn$cN$T$dYDXCP$dBTCTA$dOCLCQ$dIDEBK$dOCLCQ$dMERUC$dOCLCQ$dOCLCO$dOCLCQ$dOCLCF$dNLGGC$dOCLCO$dOCLCQ$dOCLCO$dOPELS$dOKU$dOCLCQ$dAGLDB$dOCLCA$dSTF$dD6H$dOCLCQ$dVTS$dCEF$dOCLCQ$dWYU$dLEAUB$dM8D
015 $aGBA3X3731$2bnb
019 $a162595049$a173240136$a179819639$a1035659765$a1063815321
020 $a9780080509075$q(electronic bk.)
020 $a008050907X$q(electronic bk.)
020 $a9781555582982
020 $a1555582982
035 $a(OCoLC)174142945$z(OCoLC)162595049$z(OCoLC)173240136$z(OCoLC)179819639$z(OCoLC)1035659765$z(OCoLC)1063815321
037 $a97722:97724$bElsevier Science & Technology$nhttp://www.sciencedirect.com
050 4 $aTK5105.59$b.S64 2003eb
072 7 $aCOM$x060040$2bisacsh
072 7 $aCOM$x043050$2bisacsh
072 7 $aCOM$x053000$2bisacsh
082 04 $a005.8$222
100 1 $aSpeed, Tim.
245 10 $aInternet security :$ba jumpstart for systems administrators and IT managers /$cTim Speed, Juanita Ellis.
260 $aAmsterdam ;$aBoston :$bDigital Press,$c℗♭2003.
300 $a1 online resource (xviii, 398 pages) :$billustrations
336 $atext$btxt$2rdacontent
337 $acomputer$bc$2rdamedia
338 $aonline resource$bcr$2rdacarrier
504 $aIncludes bibliographical references (pages 321-389) and index.
588 0 $aPrint version record.
505 0 $aFront Cover; Internet Security: A Jumpstart for Systems Administrators and IT Managers; Copyright Page; Contents; Foreword; Acknowledgments; Introduction; Chapter 1. The Internet and Security; Chapter 2. The Security Review Process; Chapter 3. Cryptography; Chapter 4. Secure Networks; Chapter 5. Protecting Your Intranet from the Extranet and Internet; Chapter 6. Authentication and Authorization; Chapter 7. E-Commerce. Public Key Infrastructure; Chapter 8. Messaging Security; Chapter 9. What Are We Doing Here?; Chapter 10. Disaster Recovery; Appendix 1. Security Tools.
520 $aInternet Security incorporates not only the technology needed to support a solid security strategy but also those policies and processes that must be incorporated in order for that strategy to work. New methods of breaking into corporate networks are resulting in major losses. This book provides the latest information on how to guard against attacks and informs the IT manager of the products that can detect and prevent break-ins. Crucial concepts such as authentication and encryption are explained, enabling the reader to understand when and where these technologies will be useful. Due to the a.
650 0 $aInternet$xSecurity measures.
650 0 $aComputer networks$xSecurity measures.
650 0 $aComputer security.
650 7 $aCOMPUTERS$xInternet$xSecurity.$2bisacsh
650 7 $aCOMPUTERS$xNetworking$xSecurity.$2bisacsh
650 7 $aCOMPUTERS$xSecurity$xGeneral.$2bisacsh
650 7 $aComputer networks$xSecurity measures.$2fast$0(OCoLC)fst00872341
650 7 $aComputer security.$2fast$0(OCoLC)fst00872484
650 7 $aInternet$xSecurity measures.$2fast$0(OCoLC)fst01751426
655 4 $aElectronic books.
655 0 $aElectronic books.
700 1 $aEllis, Juanita.
776 08 $iPrint version:$aSpeed, Tim.$tInternet security.$dAmsterdam ; Boston : Digital Press, ℗♭2003$z1555582982$z9781555582982$w(DLC) 2003279708$w(OCoLC)53896812
856 40 $3EBSCOhost$uhttp://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=205744
856 40 $3MyiLibrary$uhttp://www.myilibrary.com?id=103948
856 40 $3ProQuest Ebook Central$uhttp://public.ebookcentral.proquest.com/choice/publicfullrecord.aspx?p=312864
856 40 $3Referex$uhttp://www.engineeringvillage.com/controller/servlet/OpenURL?genre=book&isbn=9781555582982$zAn electronic book accessible through the World Wide Web; click for information
856 40 $3ScienceDirect$uhttp://www.sciencedirect.com/science/book/9781555582982
856 40 $3ScienceDirect$uhttp://dproxy.library.dc-uoit.ca/login?url=https://www.sciencedirect.com/science/book/9781555582982
856 41 $3Table of contents$uhttp://catdir.loc.gov/catdir/toc/els041/2003279708.html
856 42 $3Publisher description$uhttp://catdir.loc.gov/catdir/description/els041/2003279708.html
856 4 $3Safari Books Online$uhttp://proquest.safaribooksonline.com/9781555582982
856 4 $uhttp://proxy.library.carleton.ca/login?url=http://proquest.safaribooksonline.com/?uiCode=carleton&xmlId=9781555582982$zSafari (Access restricted to 5 simultaneous users)
856 40 $uhttp://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=205744$xWMS$yEBSCO Academic Comprehensive Collection$xProvider: EBSCO$xsubscribed$xeLoaderURL$xuc4$xucocn174142945
856 40 $zVIEW FULL TEXT$uhttp://VH7QX3XE2P.search.serialssolutions.com/?V=1.0&L=VH7QX3XE2P&S=JCs&C=TC0000181867&T=marc&tab=BOOKS
856 40 $3ScienceDirect$uhttps://ezproxy.aub.edu.lb/login?url=http://www.sciencedirect.com/science/book/9781555582982$zClick for electronic access to e-book.
938 $aBaker and Taylor$bBTCP$nBK0007500571
938 $aEBSCOhost$bEBSC$n205744
938 $aYBP Library Services$bYANK$n2636673
029 1 $aAU@$b000051557564
029 1 $aCHNEW$b001007209
029 1 $aDEBBG$bBV042307573
029 1 $aDEBBG$bBV043065265
029 1 $aDEBSZ$b40531177X
029 1 $aDEBSZ$b422177660
029 1 $aGBVCP$b802359671
029 1 $aNZ1$b12435494
029 1 $aAU@$b000054163152
994 $aZ0$bP4A
948 $hNO HOLDINGS IN P4A - 1233 OTHER HOLDINGS