Network security

Network Security is the first comprehensive hands-on guide to securing data and voice networks from both internal and external security threats.

Permalink: http://skupnikatalog.nsk.hr/Record/fer.KOHA-OAI-FER:38925/Details
Glavni autor: Simonds, Fred (-)
Vrsta građe: Knjiga
Jezik: eng
Impresum: New York : McGraw-Hill, c1996.
Nakladnička cjelina: McGraw-Hill series on computer communications.
Predmet:
LEADER 02461fam a2200361 a 4500
005 20130713153703.0
008 950608s1996 nyua b 001 0 eng
010 |a  95030723  
020 |a 0070576394 (hc) 
020 |a 0070576343 (pc) 
035 |a (OCoLC)32738869 
035 |a (OCoLC)ocm32738869 
035 |a (NNC)1723916 
040 |a DLC  |c DLC  |d NNC  |d HR-ZaFER  |b hrv  |e ppiak 
050 0 0 |a QA76.9.A25  |b .S35 1996 
082 0 0 |a 005.8  |2 20 
100 1 |a Simonds, Fred. 
245 1 0 |a Network security :  |b data and voice communications /  |c Fred Simonds. 
260 |a New York :  |b McGraw-Hill,  |c c1996. 
263 |a 9508 
300 |a XIX, 395 str. :  |b ilustr. ;  |c 24 cm. 
490 1 |a McGraw-Hill series on computer communications 
504 |a Includes bibliographical references and index. 
505 0 0 |g Ch. 1.  |t Where Do Security Threats Come From? --  |g Ch. 2.  |t Preventing, Detecting, and Dealing with Viruses --  |g Ch. 3.  |t Security Standards --  |g Ch. 4.  |t Authentication Methods --  |g Ch. 5.  |t Encryption Methods --  |g Ch. 6.  |t Access Control --  |g Ch. 7.  |t LAN Security --  |g Ch. 8.  |t Finding Network Operating System and Operating System Weaknesses --  |g Ch. 9.  |t Sources of Leaks in LANs and WANs --  |g Ch. 10.  |t Firewalls: TCP/IP and Internet Security --  |g Ch. 11.  |t Sources of Leaks in Voice Systems --  |g Ch. 12.  |t How Much Security is Enough? --  |g Ch. 13.  |t How to Create a Network Security Policy --  |g Ch. 14.  |t Where to Start. 
520 |a Network Security is the first comprehensive hands-on guide to securing data and voice networks from both internal and external security threats. 
520 8 |a Starting with the basics, this practical reference quickly brings the reader up to speed on such timely topics as conducting effective security audits; security risks inherent in connecting to the Internet; protecting your network from the latest viruses; incorporating the latest government encryption initiatives and policies; managing passwords, encryption, authentication, and access control; and how to construct "firewalls" to keep hackers out of your system. 
520 8 |a Packed with real-life examples, this working reference includes a product selection checklist covering a wide variety of security hardware and software products currently available. 
650 0 |a Computer security. 
650 0 |a Computer networks  |x Security measures. 
830 0 |a McGraw-Hill series on computer communications. 
900 |a AUTH  |b TOC 
942 |2 udc  |c K 
999 |c 38925  |d 38925