Record ID | marc_overdrive/InternetArchiveCrMarc-2010-06-11f.mrc:2834066:2707 |
Source | marc_overdrive |
Download Link | /show-records/marc_overdrive/InternetArchiveCrMarc-2010-06-11f.mrc:2834066:2707?format=raw |
LEADER: 02707nam 2200265Ka 4500
008 000000s2002 nyu s 000 0 eng d
040 $aTEFOD$cTEFOD
006 m d
007 cr cn---------
020 $a9780072194432 (electronic bk. : Adobe Digital Editions)
037 $bOverDrive, Inc.$nhttp://www.overdrive.com
100 1 $aMaiwald, Eric $q(Eric Maiwald).
245 10 $aNetwork Security$h[electronic resource].
260 $aNew York :$bMcGraw-Hill,$c2002.
500 $aTitle from eBook information screen.
520 $a"Create a successful security program--even if you're new to the field of network security--using this practical guidebook. You can now get the technical background you need and have access to the best and most up-to-date security practices--from one resource. You'll learn how to set up and work with firewalls, smart cards, and access controls; develop and manage effective policies and procedures; secure Internet connections; recover from security breaches; prevent hacker attacks, and much more. You'll also gain insight into actual program implementations in different environments--including e-commerce and company intranets--through real-world case studies. Plus, you'll get an 8-page network blueprint section for additional visual details on proper Internet architecture, e-Commerce architecture, intrusion detection, and the information security process. If you're looking for a solid introduction to securing a network, this is the only book you'll need.Understand the basic principles of securing information on a network Find out various methods for improving security--anti-virus software, firewalls, smart cards, intrusion detection, and much more Learn about different forms of attack and how each is accomplished Build a security program incorporating recommended technical and administrative practices Get details on associated legal and privacy issues Identify and measure risk areas within your organization Implement a successful network security program step-by-step Connect to the Internet safely and safeguard e-commerce transactions"
533 $aElectronic reproduction.$bNew York :$cMcGraw-Hill,$d2002.$nRequires Adobe Digital Editions (file size: 9022 KB).
538 $aRequires Adobe Digital Editions (file size: 9022 KB).
653 #0 $aBusiness
653 #0 $aComputer Technology
653 #0 $aNonfiction
655 7 $aElectronic books.$2local
776 1 $cOriginal$z0072133244
856 4 $uhttp://search.overdrive.com/SearchResults.aspx?ReserveID={9F45E342-83DC-4F30-A78A-4815D67B51FB}$zClick for library availability
856 4 $uhttp://www.librarybin.com/ContentDetails.htm?ID=9F45E342-83DC-4F30-A78A-4815D67B51FB$zClick to purchase