The Resource Network security : data and voice communications, Fred Simonds
Network security : data and voice communications, Fred Simonds
Resource Information
The item Network security : data and voice communications, Fred Simonds represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in Internet Archive - Open Library.This item is available to borrow from all library branches.
Resource Information
The item Network security : data and voice communications, Fred Simonds represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in Internet Archive - Open Library.
This item is available to borrow from all library branches.
- Summary
- "Network Security is the first comprehensive hands-on guide to securing data and voice networks from both internal and external security threats." "Starting with the basics, this practical reference quickly brings the reader up to speed on such timely topics as conducting effective security audits; security risks inherent in connecting to the Internet; protecting your network from the latest viruses; incorporating the latest government encryption initiatives and policies; managing passwords, encryption, authentication, and access control; and how to construct "firewalls" to keep hackers out of your system." "Packed with real-life examples, this working reference includes a product selection checklist covering a wide variety of security hardware and software products currently available."--BOOK JACKET
- Language
- eng
- Extent
- 1 online resource (xix, 395 pages
- Contents
-
- Ch. 1. Where Do Security Threats Come From?
- Ch. 2. Preventing, Detecting, and Dealing with Viruses
- Ch. 3. Security Standards
- Ch. 4. Authentication Methods
- Ch. 5. Encryption Methods
- Ch. 6. Access Control
- Ch. 7. LAN Security
- Ch. 8. Finding Network Operating System and Operating System Weaknesses
- Ch. 9. Sources of Leaks in LANs and WANs
- Ch. 10. Firewalls: TCP/IP and Internet Security
- Ch. 11. Sources of Leaks in Voice Systems
- Ch. 12. How Much Security is Enough?
- Ch. 13. How to Create a Network Security Policy
- Ch. 14. Where to Start
- Label
- Network security : data and voice communications
- Title
- Network security
- Title remainder
- data and voice communications
- Statement of responsibility
- Fred Simonds
- Language
- eng
- Summary
- "Network Security is the first comprehensive hands-on guide to securing data and voice networks from both internal and external security threats." "Starting with the basics, this practical reference quickly brings the reader up to speed on such timely topics as conducting effective security audits; security risks inherent in connecting to the Internet; protecting your network from the latest viruses; incorporating the latest government encryption initiatives and policies; managing passwords, encryption, authentication, and access control; and how to construct "firewalls" to keep hackers out of your system." "Packed with real-life examples, this working reference includes a product selection checklist covering a wide variety of security hardware and software products currently available."--BOOK JACKET
- Cataloging source
- DLC
- http://library.link/vocab/creatorName
- Simonds, Fred
- Dewey number
- 005.8
- Illustrations
- illustrations
- Index
- index present
- LC call number
- QA76.9.A25
- LC item number
- S56 1996
- Literary form
- non fiction
- Nature of contents
-
- dictionaries
- bibliography
- Series statement
- McGraw-Hill series on computer communications
- http://library.link/vocab/subjectName
-
- Computer security
- Computer networks
- Computer networks
- Computer security
- Computernetwerken
- Computerbeveiliging
- Datensicherung
- Rechnernetz
- Datensicherung
- Rechnernetz
- Label
- Network security : data and voice communications, Fred Simonds
- Bibliography note
- Includes bibliographical references (pages 379-380) and index
- Carrier category
- volume
- Carrier category code
- nc
- Carrier MARC source
- rdacarrier
- Content category
- text
- Content type code
- txt
- Content type MARC source
- rdacontent
- Contents
- Ch. 1. Where Do Security Threats Come From? -- Ch. 2. Preventing, Detecting, and Dealing with Viruses -- Ch. 3. Security Standards -- Ch. 4. Authentication Methods -- Ch. 5. Encryption Methods -- Ch. 6. Access Control -- Ch. 7. LAN Security -- Ch. 8. Finding Network Operating System and Operating System Weaknesses -- Ch. 9. Sources of Leaks in LANs and WANs -- Ch. 10. Firewalls: TCP/IP and Internet Security -- Ch. 11. Sources of Leaks in Voice Systems -- Ch. 12. How Much Security is Enough? -- Ch. 13. How to Create a Network Security Policy -- Ch. 14. Where to Start
- Extent
- 1 online resource (xix, 395 pages
- Form of item
- online
- Media category
- unmediated
- Media MARC source
- rdamedia
- Media type code
- n
- Other physical details
- illustrations)
- Specific material designation
- remote
- System control number
- (OCoLC)1049897236
- Label
- Network security : data and voice communications, Fred Simonds
- Bibliography note
- Includes bibliographical references (pages 379-380) and index
- Carrier category
- volume
- Carrier category code
- nc
- Carrier MARC source
- rdacarrier
- Content category
- text
- Content type code
- txt
- Content type MARC source
- rdacontent
- Contents
- Ch. 1. Where Do Security Threats Come From? -- Ch. 2. Preventing, Detecting, and Dealing with Viruses -- Ch. 3. Security Standards -- Ch. 4. Authentication Methods -- Ch. 5. Encryption Methods -- Ch. 6. Access Control -- Ch. 7. LAN Security -- Ch. 8. Finding Network Operating System and Operating System Weaknesses -- Ch. 9. Sources of Leaks in LANs and WANs -- Ch. 10. Firewalls: TCP/IP and Internet Security -- Ch. 11. Sources of Leaks in Voice Systems -- Ch. 12. How Much Security is Enough? -- Ch. 13. How to Create a Network Security Policy -- Ch. 14. Where to Start
- Extent
- 1 online resource (xix, 395 pages
- Form of item
- online
- Media category
- unmediated
- Media MARC source
- rdamedia
- Media type code
- n
- Other physical details
- illustrations)
- Specific material designation
- remote
- System control number
- (OCoLC)1049897236
Library Links
Embed (Experimental)
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.archive.org/portal/Network-security--data-and-voice-communications/anO64NNsufY/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.archive.org/portal/Network-security--data-and-voice-communications/anO64NNsufY/">Network security : data and voice communications, Fred Simonds</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.archive.org/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.archive.org/">Internet Archive - Open Library</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Item Network security : data and voice communications, Fred Simonds
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.archive.org/portal/Network-security--data-and-voice-communications/anO64NNsufY/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.archive.org/portal/Network-security--data-and-voice-communications/anO64NNsufY/">Network security : data and voice communications, Fred Simonds</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.archive.org/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.archive.org/">Internet Archive - Open Library</a></span></span></span></span></div>