skip to content
Network security bible Preview this item
ClosePreview this item
Checking...

Network security bible

Author: Eric Cole; Ronald L Krutz; James W Conley
Publisher: Indianapolis, IN : Wiley, ©2009.
Edition/Format:   Print book : English : 2nd edView all editions and formats
Database:WorldCat
Summary:

The comprehensive A-to-Z guide on network security, fully revised and updated Network security is constantly evolving, and this comprehensive guide has been thoroughly updated to cover the newest  Read more...

Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

 

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Additional Physical Format: (OCoLC)791400934
(NO-TrBIB)101286643
(OCoLC)791278612
(NO-TrBIB)102788189
Material Type: Internet resource
Document Type: Book, Internet Resource
All Authors / Contributors: Eric Cole; Ronald L Krutz; James W Conley
ISBN: 9780470502495 0470502495
OCLC Number: 423589883
Notes: Includes index.
Description: xliv, 891 pages : illustrations ; 24 cm
Contents: Introduction. Part I: Network Security Landscape. Chapter 1: State of Network Security. Chapter 2: New Approaches to Cyber Security. Chapter3: InterfacingwiththeOrganization. Part II: Security Principles and Practices. Chapter 4: Information System Security Principles. Chapter 5: Information System Security Management. Chapter 6: Access Control. Chapter 7: Attacks and Threats. Part III: Operating Systems and Applications. Chapter 8: Windows Security. Chapter 9: UNIX and Linux Security. Chapter 10: Web Browser and Client Security. Chapter 11: Web Security. Chapter 12: Electronic mail (E-mail) Security. Chapter13:DomainName System. Chapter 14: Server Security. Part IV: Network Security Fundamentals. Chapter15:NetworkProtocols. Chapter 16: Wireless Security. Chapter17:NetworkArchitecture Fundamentals. Chapter18: Firewalls. Chapter 19: Intrusion Detection/Prevention. Part V: Communication. Chapter 20: Secret Communication. Chapter21:CovertCommunication. Chapter 22: Applications of Secure/Covert Communication. Part VI: The Security Threat and Response. Chapter23: IntrusionDetection andResponse. Chapter 25: Security Assessments, Testing, and Evaluation. Part VII: Integrated Cyber Security. Chapter 26: Validating Your Security. Chapter27:DataProtection. Chapter 28: Putting Everything Together. Chapter29:The Future. Index.
Responsibility: Eric Cole, Ronald Krutz, James W. Conley.
More information:

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/423589883> # Network security bible
    a schema:CreativeWork, schema:Book ;
    library:oclcnum "423589883" ;
    library:placeOfPublication <http://id.loc.gov/vocabulary/countries/inu> ;
    library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/17310135#Place/indianapolis_in> ; # Indianapolis, IN
    schema:about <http://id.worldcat.org/fast/872484> ; # Computer security
    schema:about <http://experiment.worldcat.org/entity/work/data/17310135#Topic/manuels> ; # Manuels
    schema:about <http://experiment.worldcat.org/entity/work/data/17310135#Topic/delits_informatiques> ; # Délits informatiques
    schema:about <http://experiment.worldcat.org/entity/work/data/17310135#Topic/internet> ; # Internet
    schema:about <http://experiment.worldcat.org/entity/work/data/17310135#Topic/virus_informatique> ; # Virus informatique
    schema:about <http://id.worldcat.org/fast/872341> ; # Computer networks--Security measures
    schema:about <http://id.loc.gov/authorities/subjects/sh94001277> ; # Computer networks--Security measures
    schema:about <http://experiment.worldcat.org/entity/work/data/17310135#Topic/datamaskinnett_sikkerhet> ; # Datamaskinnett--Sikkerhet
    schema:about <http://experiment.worldcat.org/entity/work/data/17310135#Topic/securite_informatique> ; # Sécurité informatique
    schema:about <http://experiment.worldcat.org/entity/work/data/17310135#Topic/technologies_de_l_information_et_de_la_communication> ; # Technologies de l'information et de la communication
    schema:about <http://experiment.worldcat.org/entity/work/data/17310135#Topic/reseaux_informatiques> ; # Réseaux informatiques
    schema:about <http://dewey.info/class/005.8/e23/> ;
    schema:bookEdition "2nd ed." ;
    schema:bookFormat bgn:PrintBook ;
    schema:contributor <http://experiment.worldcat.org/entity/work/data/17310135#Person/conley_james_w> ; # James W. Conley
    schema:contributor <http://viaf.org/viaf/38195831> ; # Ronald L. Krutz
    schema:copyrightYear "2009" ;
    schema:creator <http://experiment.worldcat.org/entity/work/data/17310135#Person/cole_eric> ; # Eric Cole
    schema:datePublished "2009" ;
    schema:exampleOfWork <http://worldcat.org/entity/work/id/17310135> ;
    schema:inLanguage "en" ;
    schema:isSimilarTo <http://www.worldcat.org/oclc/791400934> ;
    schema:isSimilarTo <http://www.worldcat.org/oclc/791278612> ;
    schema:name "Network security bible"@en ;
    schema:productID "423589883" ;
    schema:publication <http://www.worldcat.org/title/-/oclc/423589883#PublicationEvent/indianapolis_in_wiley_2009> ;
    schema:publisher <http://experiment.worldcat.org/entity/work/data/17310135#Agent/wiley> ; # Wiley
    schema:url <http://catdir.loc.gov/catdir/toc/ecip053/2004025696.html> ;
    schema:workExample <http://worldcat.org/isbn/9780470502495> ;
    umbel:isLike <http://bnb.data.bl.uk/id/resource/015-30747> ;
    umbel:isLike <http://bnb.data.bl.uk/id/resource/GBA967081> ;
    wdrs:describedby <http://www.worldcat.org/title/-/oclc/423589883> ;
    .


Related Entities

<http://catdir.loc.gov/catdir/toc/ecip053/2004025696.html>
    rdfs:comment "Table of contents only" ;
    .

<http://experiment.worldcat.org/entity/work/data/17310135#Person/cole_eric> # Eric Cole
    a schema:Person ;
    schema:familyName "Cole" ;
    schema:givenName "Eric" ;
    schema:name "Eric Cole" ;
    .

<http://experiment.worldcat.org/entity/work/data/17310135#Person/conley_james_w> # James W. Conley
    a schema:Person ;
    schema:familyName "Conley" ;
    schema:givenName "James W." ;
    schema:name "James W. Conley" ;
    .

<http://experiment.worldcat.org/entity/work/data/17310135#Place/indianapolis_in> # Indianapolis, IN
    a schema:Place ;
    schema:name "Indianapolis, IN" ;
    .

<http://experiment.worldcat.org/entity/work/data/17310135#Topic/datamaskinnett_sikkerhet> # Datamaskinnett--Sikkerhet
    a schema:Intangible ;
    schema:name "Datamaskinnett--Sikkerhet"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/17310135#Topic/delits_informatiques> # Délits informatiques
    a schema:Intangible ;
    schema:name "Délits informatiques"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/17310135#Topic/reseaux_informatiques> # Réseaux informatiques
    a schema:Intangible ;
    schema:name "Réseaux informatiques"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/17310135#Topic/securite_informatique> # Sécurité informatique
    a schema:Intangible ;
    schema:name "Sécurité informatique"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/17310135#Topic/technologies_de_l_information_et_de_la_communication> # Technologies de l'information et de la communication
    a schema:Intangible ;
    schema:name "Technologies de l'information et de la communication"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/17310135#Topic/virus_informatique> # Virus informatique
    a schema:Intangible ;
    schema:name "Virus informatique"@en ;
    .

<http://id.loc.gov/authorities/subjects/sh94001277> # Computer networks--Security measures
    a schema:Intangible ;
    schema:name "Computer networks--Security measures"@en ;
    .

<http://id.worldcat.org/fast/872341> # Computer networks--Security measures
    a schema:Intangible ;
    schema:name "Computer networks--Security measures"@en ;
    .

<http://id.worldcat.org/fast/872484> # Computer security
    a schema:Intangible ;
    schema:name "Computer security"@en ;
    .

<http://viaf.org/viaf/38195831> # Ronald L. Krutz
    a schema:Person ;
    schema:birthDate "1938" ;
    schema:familyName "Krutz" ;
    schema:givenName "Ronald L." ;
    schema:name "Ronald L. Krutz" ;
    .

<http://worldcat.org/isbn/9780470502495>
    a schema:ProductModel ;
    schema:isbn "0470502495" ;
    schema:isbn "9780470502495" ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.