It looks like you're offline.
Open Library logo
additional options menu

MARC record from Internet Archive

LEADER: 04170cam 2200817 a 4500
001 ocm34410451
003 OCoLC
005 20160204002911.0
008 960304s1996 nyua 001 0 eng
010 $a 96002344
040 $aDLC$beng$cDLC$dUBA$dNLGGC$dBTCTA$dYDXCP$dCN4X3$dZWZ$dDEBBG$dOCLCQ$dOCLCF$dNLE$dOCLCO$dOCLCQ
015 $aGB96Y3929$2bnb
019 $a877435754
020 $a0471137529$q(pbk. :$qalk. paper)
020 $a9780471137528$q(pbk. :$qalk. paper)
035 $a(OCoLC)34410451$z(OCoLC)877435754
050 00 $aHD30.38$b.I57 1996
082 00 $a658.4/78$220
084 $a54.89$2bcl
084 $aQP 345$2rvk
245 00 $aInternet security for business /$cTerry Bernstein [and others].
260 $aNew York :$bWiley,$c℗♭1996.
300 $axi, 452 pages :$billustrations ;$c24 cm
336 $atext$btxt$2rdacontent
337 $aunmediated$bn$2rdamedia
338 $avolume$bnc$2rdacarrier
500 $aIncludes index.
505 0 $aCh. 1. Opportunities ... and Risks -- Ch. 2. Understanding the Threats to Security -- Ch. 3. Building the Internet Security Program -- Ch. 4. Designing and Implementing the Security Program -- Ch. 5. Securing the Internet Connection -- Ch. 6. The Firewall -- Ch. 7. Securing User Services -- Ch. 8. Securing Business Services -- Ch. 9. Responding to Internet Attacks -- Ch. 10. Electronic Commerce -- Ch. 11. The Future of the Internet and Internet Security -- Appendix A: Legal and Social Issues in the Workplace -- Appendix B: TCP/IP Protocol Vulnerabilities -- Appendix C: Internet Security Policy -- Appendix D: Alliances -- Appendix E: Where to Find More Information.
650 0 $aBusiness enterprises$xComputer networks$xSecurity measures.
650 0 $aInternet$xSecurity measures.
650 0 $aWorld Wide Web$xSecurity measures.
650 0 $aElectronic funds transfers$xSecurity measures.
650 0 $aData encryption (Computer science)
650 7 $aBusiness enterprises$xComputer networks$xSecurity measures.$2fast$0(OCoLC)fst00842535
650 7 $aData encryption (Computer science)$2fast$0(OCoLC)fst00887935
650 7 $aElectronic funds transfers$xSecurity measures.$2fast$0(OCoLC)fst00907220
650 7 $aInternet$xSecurity measures.$2fast$0(OCoLC)fst01751426
650 7 $aWorld Wide Web$xSecurity measures.$2fast$0(OCoLC)fst01181329
650 17 $aComputerbeveiliging.$2gtt
650 17 $aWorld wide web.$2gtt
650 17 $aDatabescherming.$2gtt
650 7 $aRedes de computadores e tecnicas.$2larpcal
650 7 $aGestion$xInformatique$xMesures de se curite .$2ram
650 7 $aInternet$xMesures de se curite .$2ram
650 7 $aWeb$xMesures de se curite .$2ram
650 7 $aMonnaie e lectronique$xMesures de se cirite .$2ram
650 07 $aComputersicherheit.$2swd
650 07 $aInternet.$2swd
700 1 $aBernstein, Terry.
776 08 $iOnline version:$tInternet security for business.$dNew York : Wiley, ℗♭1996$w(OCoLC)760175883
856 41 $3Table of contents$uhttp://catdir.loc.gov/catdir/toc/onix03/96002344.html
856 42 $3Contributor biographical information$uhttp://catdir.loc.gov/catdir/bios/wiley041/96002344.html
856 42 $3Publisher description$uhttp://catdir.loc.gov/catdir/description/wiley032/96002344.html
938 $aBaker and Taylor$bBTCP$n96002344
938 $aYBP Library Services$bYANK$n416660
952 $a34410451$zDLC$dURI$hFull$iLCC$kDDC$tContents$u20150606
952 $a483825301$zN15$bNEW YORK UNIV, GROUP BATCHLOAD$hFull$iLCC$kDDC$u20100705
952 $a133170920$zBOL$bUNIV OF CALIFORNIA BERKELEY LAW LIBR$hFull$iLCC$kDDC$u20100720
952 $a188667511$zPAU$bUNIV OF PENNSYLVANIA$hFull$iLCC$kDDC$u20100723
952 $a477257911$zTEU$bTEMPLE UNIV$hFull$u20100802
952 $a266877738$zCUD$bCAMBRIDGE UNIV$hFull$u20110322
029 1 $aAU@$b000012240316
029 1 $aDEBBG$bBV011075489
029 1 $aHEBIS$b050105116
029 1 $aNLGGC$b147248353
029 1 $aNZ1$b4740946
029 1 $aUNITY$b051821656
029 1 $aYDXCP$b416660
029 1 $aZWZ$b025084925
994 $aZ0$bPMR
948 $hNO HOLDINGS IN PMR - 295 OTHER HOLDINGS