The Internet security guidebook : (Record no. 19666)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 02710cam a22002294a 4500 |
001 - CONTROL NUMBER | |
control field | 12231381 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20210302173236.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 001115s2001 caua b 001 0 eng |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9780122374715 (pbk) |
040 ## - CATALOGING SOURCE | |
Transcribing agency | DLC |
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 005.8 |
Edition number | 21 |
Item number | El591 |
100 1# - MAIN ENTRY--PERSONAL NAME | |
Personal name | Ellis, Juanita. |
245 14 - TITLE STATEMENT | |
Title | The Internet security guidebook : |
Remainder of title | from planning to deployment / |
Statement of responsibility, etc | Juanita Ellis, Tim Speed. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
Place of publication, distribution, etc | San Diego : |
Name of publisher, distributor, etc | Academic Press, |
Date of publication, distribution, etc | 2001 |
300 ## - PHYSICAL DESCRIPTION | |
Extent | xxiv, 320 p. : |
Other physical details | ill. ; |
Dimensions | 24 cm. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer networks |
General subdivision | Security measures. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Internet |
General subdivision | Security measures. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Electronic commerce |
General subdivision | Security measures. |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Speed, Tim. |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | Books |
505 0# - FORMATTED CONTENTS NOTE | |
Formatted contents note | ForewordPrefaceAcknowledgementsCopyright Notices and StatementsIntroduction Who Is Knocking at the Door?Chapter 1 Let's Do Business1.1 Security Components1.2 Do You Have a Process?1.3 The Cost of SecurityChapter 2 Security Review2.1 Review the Business2.2 What Is a Trusted Network?2.3 Initial Risk Analysis2.4 The Policy2.5 Implementation and FeedbackChapter 3 Cryptography3.1 History3.2 Key Types3.3 RSA-Public and Private Key3.4 PKI and Business SolutionsChapter 4 Secure Networks4.1 TCP/IP and OSI4.2 Port of Call (Let's Go on a Cruise)4.3 Denial-of-Service Attacks4.4 Virtual Private Networks4.5 Secure Sockets Layer (SSL)Chapter 5 Protecting Your Intranetfrom the Extranet and Internet5.1 So Many Choices! I'll Get One of Each!5.2 Firewall Product Functional Summaries5.3 Firewall Buyer's Assessment Form5.4 Firewall Vendors: Picking theProducts That Are Right for YouChapter 6 Authentication6.1 The Basics6.2 Authentication6.3 Authorisation6.4 Smart CardsChapter 7 E-Commerce-Public Key Infrastructure (PKI)7.1 PKI and You7.2 X.5097.3 Certificate Authority7.4 Certification Practice Statement7.5 Certificate Revocation List7.6 Key Recovery7.7 Lightweight Directory Access Protocol (LDAP)7.8 Public Key Cryptography Standards7.9 Public Key Infrastructure (X.509) StandardsChapter 8 Messaging Security8.1 Safe Communication-Messaging8.2 Getting Killed with Junk Mail8.3 Keep It RunningChapter 9 What Are We Doing Here?9.1 Risk Analysis9.2 Where Are the Threats?9.3 Technology Security Review9.4 Control Directory and Environmental Risk Table9.5 Competitive AssetChapter 10 Let's Make the Plans10.1 Security Plans, Policies, Procedures10.2 The Corporate Security Policy Document10.3 Physical Security Policy10.4 Network Security Policy10.5 Acceptable Use PolicyChapter 11 We Have BeenHacked! Oh, the Humanity!11.1 Incident HandlingChapter 12 The Total Package Specific Steps12.1 Putting It All Together12.2 The Plan12.3 Sample Plan to Roll Out PKIAppendix 1 Security ToolsA1.1 ToolsA1.2 Other Tool URLs |
Withdrawn status | Damaged status | Not for loan | Home library | Current library | Date acquired | Source of acquisition | Full call number | Barcode | Date last seen | Price effective from | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|
UE-Central Library | UE-Central Library | 03.03.2021 | U.E. | 005.8 El591 | T13053 | 03.03.2021 | 03.03.2021 | Books |