|
|
|
|
LEADER |
02461fam a2200361 a 4500 |
005 |
20130713153703.0 |
008 |
950608s1996 nyua b 001 0 eng |
010 |
|
|
|a 95030723
|
020 |
|
|
|a 0070576394 (hc)
|
020 |
|
|
|a 0070576343 (pc)
|
035 |
|
|
|a (OCoLC)32738869
|
035 |
|
|
|a (OCoLC)ocm32738869
|
035 |
|
|
|a (NNC)1723916
|
040 |
|
|
|a DLC
|c DLC
|d NNC
|d HR-ZaFER
|b hrv
|e ppiak
|
050 |
0 |
0 |
|a QA76.9.A25
|b .S35 1996
|
082 |
0 |
0 |
|a 005.8
|2 20
|
100 |
1 |
|
|a Simonds, Fred.
|
245 |
1 |
0 |
|a Network security :
|b data and voice communications /
|c Fred Simonds.
|
260 |
|
|
|a New York :
|b McGraw-Hill,
|c c1996.
|
263 |
|
|
|a 9508
|
300 |
|
|
|a XIX, 395 str. :
|b ilustr. ;
|c 24 cm.
|
490 |
1 |
|
|a McGraw-Hill series on computer communications
|
504 |
|
|
|a Includes bibliographical references and index.
|
505 |
0 |
0 |
|g Ch. 1.
|t Where Do Security Threats Come From? --
|g Ch. 2.
|t Preventing, Detecting, and Dealing with Viruses --
|g Ch. 3.
|t Security Standards --
|g Ch. 4.
|t Authentication Methods --
|g Ch. 5.
|t Encryption Methods --
|g Ch. 6.
|t Access Control --
|g Ch. 7.
|t LAN Security --
|g Ch. 8.
|t Finding Network Operating System and Operating System Weaknesses --
|g Ch. 9.
|t Sources of Leaks in LANs and WANs --
|g Ch. 10.
|t Firewalls: TCP/IP and Internet Security --
|g Ch. 11.
|t Sources of Leaks in Voice Systems --
|g Ch. 12.
|t How Much Security is Enough? --
|g Ch. 13.
|t How to Create a Network Security Policy --
|g Ch. 14.
|t Where to Start.
|
520 |
|
|
|a Network Security is the first comprehensive hands-on guide to securing data and voice networks from both internal and external security threats.
|
520 |
8 |
|
|a Starting with the basics, this practical reference quickly brings the reader up to speed on such timely topics as conducting effective security audits; security risks inherent in connecting to the Internet; protecting your network from the latest viruses; incorporating the latest government encryption initiatives and policies; managing passwords, encryption, authentication, and access control; and how to construct "firewalls" to keep hackers out of your system.
|
520 |
8 |
|
|a Packed with real-life examples, this working reference includes a product selection checklist covering a wide variety of security hardware and software products currently available.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
830 |
|
0 |
|a McGraw-Hill series on computer communications.
|
900 |
|
|
|a AUTH
|b TOC
|
942 |
|
|
|2 udc
|c K
|
999 |
|
|
|c 38925
|d 38925
|