Record ID | marc_columbia/Columbia-extract-20221130-004.mrc:291641020:1790 |
Source | marc_columbia |
Download Link | /show-records/marc_columbia/Columbia-extract-20221130-004.mrc:291641020:1790?format=raw |
LEADER: 01790fam a2200325 a 4500
001 1723722
005 20220608221342.0
008 950606t19951995maua b 001 0 eng
010 $a 95023939
020 $a0890068011 (alk. paper)
035 $a(OCoLC)32746828
035 $a(OCoLC)ocm32746828
035 $9ALC8817CU
035 $a(NNC)1723722
035 $a1723722
040 $aDLC$cDLC$dDLC$dOrLoB
050 00 $aTK5105.59$b.H46 1995
082 00 $a005.8$220
100 1 $aHendry, Mike.$0http://id.loc.gov/authorities/names/n93064155
245 10 $aPractical computer network security /$cMike Hendry.
260 $aBoston :$bArtech House,$c[1995], ©1995.
300 $axi, 203 pages :$billustrations ;$c24 cm.
336 $atext$btxt$2rdacontent
337 $aunmediated$bn$2rdamedia
490 1 $aThe Artech House telecommunications library
504 $aIncludes bibliographical references (p. 191-192) and index.
505 20 $gPt. I.$tRequirements and Risks --$gCh. 1.$tIntroduction.$gCh. 2.$tAspects of Security.$gCh. 3.$tPreconditions.$gCh. 4.$tRisk Management.$gCh. 5.$tHardware, Software, and Networks.$gCh. 6.$tApplication-Specific Risks --$gPt. II.$tTechnology.$gCh. 7.$tEncryption Principles.$gCh. 8.$tKeys and Key Management.$gCh. 9.$tHardware Tools.$gCh. 10.$tSoftware Tools.$gCh. 11.$tAccess Rights Management.$gCh. 12.$tTypes of Networks --$gPt. III.$tApplications.$gCh. 13.$tCommercial.$gCh. 14.$tBanking and Financial.$gCh. 15.$tSubscription Services.$gCh. 16.$tOther Applications.$gCh. 17.$tSummary and Conclusions.
650 0 $aComputer networks$xSecurity measures.$0http://id.loc.gov/authorities/subjects/sh94001277
830 0 $aArtech House telecommunications library.$0http://id.loc.gov/authorities/names/n42002466
852 00 $boff,eng$hTK5105.59$i.H46 1995