skip to content
Network security bible Preview this item
ClosePreview this item
Checking...

Network security bible

Author: Eric Cole; Ronald L Krutz; James W Conley
Publisher: Indianapolis, IN : Wiley Pub., ©2005.
Edition/Format:   Print book : Document   Computer File : EnglishView all editions and formats
Summary:
A must for working network and security professionals as well as anyone in IS seeking to build competence in the increasingly important field of securtiy. Written by three high-profile experts, including Eric Cole, an ex-CIA security guru who appears regularly on CNN and elsewhere in the media, and Ronald Krutz, a security pioneer who co-wrote The CISSP Prep Guide and other security bestsellers. Covers everything  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Material Type: Document, Internet resource
Document Type: Book, Computer File, Internet Resource
All Authors / Contributors: Eric Cole; Ronald L Krutz; James W Conley
ISBN: 0764573977 9780764573972
OCLC Number: 56894558
Notes: Includes index.
Description: xxxiv, 660 pages : illustrations ; 24 cm
Details: Mode of access: Internet via World Wide Web.
Contents: Information system security principles --
Information system security management --
Access control considerations --
Windows security --
UNIX and Linux security --
Web browser and client security --
Web security --
E-mail security --
Domain name system --
Server security --
Network protocols --
Wireless security --
Network architecture fundamentals --
Secret communication --
Covert communication --
Applications of secure/covert communication --
Intrusion detection and response --
Security assessments, testing, and evaluation--
Putting everything together.
Responsibility: Eric Cole, Ronald Krutz, and James W. Conley.
More information:

Abstract:

Covering everything from basic security principles and practices to the latest security threats and responses, including proven methods for diagnosing network vulnerabilities and insider secrets for  Read more...

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.

Similar Items

Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/56894558> # Network security bible
    a schema:Book, schema:CreativeWork, schema:MediaObject ;
    library:oclcnum "56894558" ;
    library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/17310135#Place/indianapolis_in> ; # Indianapolis, IN
    library:placeOfPublication <http://id.loc.gov/vocabulary/countries/inu> ;
    schema:about <http://id.worldcat.org/fast/872341> ; # Computer networks--Security measures
    schema:about <http://dewey.info/class/005.8/e22/> ;
    schema:about <http://id.worldcat.org/fast/872484> ; # Computer security
    schema:about <http://id.loc.gov/authorities/subjects/sh94001277> ; # Computer networks--Security measures
    schema:bookFormat bgn:PrintBook ;
    schema:contributor <http://viaf.org/viaf/38195831> ; # Ronald L. Krutz
    schema:contributor <http://viaf.org/viaf/48614594> ; # James W. Conley
    schema:copyrightYear "2005" ;
    schema:creator <http://viaf.org/viaf/34111691> ; # Eric Cole
    schema:datePublished "2005" ;
    schema:description "A must for working network and security professionals as well as anyone in IS seeking to build competence in the increasingly important field of securtiy. Written by three high-profile experts, including Eric Cole, an ex-CIA security guru who appears regularly on CNN and elsewhere in the media, and Ronald Krutz, a security pioneer who co-wrote The CISSP Prep Guide and other security bestsellers. Covers everything from basic security principles and practices to the latest security threats and responses, including proven methods for diagnosing network vulnerabilities and insider secrets for boosting security effectiveness."@en ;
    schema:description "Information system security principles -- Information system security management -- Access control considerations -- Windows security -- UNIX and Linux security -- Web browser and client security -- Web security -- E-mail security -- Domain name system -- Server security -- Network protocols -- Wireless security -- Network architecture fundamentals -- Secret communication -- Covert communication -- Applications of secure/covert communication -- Intrusion detection and response -- Security assessments, testing, and evaluation-- Putting everything together."@en ;
    schema:exampleOfWork <http://worldcat.org/entity/work/id/17310135> ;
    schema:genre "Electronic books"@en ;
    schema:inLanguage "en" ;
    schema:name "Network security bible"@en ;
    schema:productID "56894558" ;
    schema:publication <http://www.worldcat.org/title/-/oclc/56894558#PublicationEvent/indianapolis_in_wiley_pub_2005> ;
    schema:publisher <http://experiment.worldcat.org/entity/work/data/17310135#Agent/wiley_pub> ; # Wiley Pub.
    schema:url <http://catdir.loc.gov/catdir/toc/ecip053/2004025696.html> ;
    schema:url <http://site.ebrary.com/id/10114240> ;
    schema:workExample <http://worldcat.org/isbn/9780764573972> ;
    umbel:isLike <http://bnb.data.bl.uk/id/resource/GBA478446> ;
    wdrs:describedby <http://www.worldcat.org/title/-/oclc/56894558> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/17310135#Place/indianapolis_in> # Indianapolis, IN
    a schema:Place ;
    schema:name "Indianapolis, IN" ;
    .

<http://id.loc.gov/authorities/subjects/sh94001277> # Computer networks--Security measures
    a schema:Intangible ;
    schema:name "Computer networks--Security measures"@en ;
    .

<http://id.worldcat.org/fast/872341> # Computer networks--Security measures
    a schema:Intangible ;
    schema:name "Computer networks--Security measures"@en ;
    .

<http://id.worldcat.org/fast/872484> # Computer security
    a schema:Intangible ;
    schema:name "Computer security"@en ;
    .

<http://viaf.org/viaf/34111691> # Eric Cole
    a schema:Person ;
    schema:familyName "Cole" ;
    schema:givenName "Eric" ;
    schema:name "Eric Cole" ;
    .

<http://viaf.org/viaf/38195831> # Ronald L. Krutz
    a schema:Person ;
    schema:birthDate "1938" ;
    schema:familyName "Krutz" ;
    schema:givenName "Ronald L." ;
    schema:name "Ronald L. Krutz" ;
    .

<http://viaf.org/viaf/48614594> # James W. Conley
    a schema:Person ;
    schema:familyName "Conley" ;
    schema:givenName "James W." ;
    schema:name "James W. Conley" ;
    .

<http://worldcat.org/isbn/9780764573972>
    a schema:ProductModel ;
    schema:isbn "0764573977" ;
    schema:isbn "9780764573972" ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.