語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Inside network perimeter security = ...
~
Edmead, Mark T.
FindBook
Google Book
Amazon
博客來
Inside network perimeter security = the definitive guide to firewalls, VPNs, routers, and intrusion detection systems /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Inside network perimeter security/ primary authors, Stephen Northcutt ... [et al.] ; contributing authors, Mark Edmead ... [et al.].
其他題名:
the definitive guide to firewalls, VPNs, routers, and intrusion detection systems /
其他作者:
Edmead, Mark T.
出版者:
Indianapolis, Ind. :New Riders, : c2003.,
面頁冊數:
xxvii, 678 p. :ill. ;24 cm.
附註:
Title from ebook title screen (viewed on Apr. 28, 2005).
內容註:
Perimeter security fundamentals -- Packet filtering -- Stateful firewalls -- Proxy firewalls -- Security policy -- Role of a router -- Network intrusion detection -- Virtual private networks -- Host hardening -- Host defense components -- Design fundamentals -- Separating resources -- Software architecture -- VPN integration -- Tuning the design for performance -- Sample designs -- Maintaining a security perimeter -- Network log file analysis -- Troubleshooting defense components -- Assessment techniques -- Design under fire -- Importance of defense in depth.
標題:
Computer networks - Security measures. -
電子資源:
http://www.netLibrary.com/urlapi.asp?action=summary&v=1&bookid=128865An electronic book accessible through the World Wide Web; click for information
ISBN:
0768664101 (electronic bk.)
Inside network perimeter security = the definitive guide to firewalls, VPNs, routers, and intrusion detection systems /
Inside network perimeter security
the definitive guide to firewalls, VPNs, routers, and intrusion detection systems /[electronic resource] :primary authors, Stephen Northcutt ... [et al.] ; contributing authors, Mark Edmead ... [et al.]. - 1st ed. - Indianapolis, Ind. :New Riders,c2003. - xxvii, 678 p. :ill. ;24 cm.
Title from ebook title screen (viewed on Apr. 28, 2005).
Includes bibliographical references and index.
Perimeter security fundamentals -- Packet filtering -- Stateful firewalls -- Proxy firewalls -- Security policy -- Role of a router -- Network intrusion detection -- Virtual private networks -- Host hardening -- Host defense components -- Design fundamentals -- Separating resources -- Software architecture -- VPN integration -- Tuning the design for performance -- Sample designs -- Maintaining a security perimeter -- Network log file analysis -- Troubleshooting defense components -- Assessment techniques -- Design under fire -- Importance of defense in depth.
Electronic reproduction.
Boulder, Colo. :
NetLibrary,
2005.
Available via World Wide Web.
ISBN: 0768664101 (electronic bk.)Subjects--Topical Terms:
579161
Computer networks
--Security measures.Index Terms--Genre/Form:
542853
Electronic books.
LC Class. No.: TK5105.59 / .I53 2003eb
Dewey Class. No.: 005.8
Inside network perimeter security = the definitive guide to firewalls, VPNs, routers, and intrusion detection systems /
LDR
:01836cam a2200277 a 45
001
738726
003
OCoLC
005
20080425
006
m d
007
cr cnu---unuuu
008
080425s2003 inua sb 001 0 eng d
020
$a
0768664101 (electronic bk.)
035
$a
ocm59786781
040
$a
N
$c
N
$d
OCL
049
$a
AMFA
050
1 4
$a
TK5105.59
$b
.I53 2003eb
082
0 4
$a
005.8
$2
22
245
0 0
$a
Inside network perimeter security
$h
[electronic resource] :
$b
the definitive guide to firewalls, VPNs, routers, and intrusion detection systems /
$c
primary authors, Stephen Northcutt ... [et al.] ; contributing authors, Mark Edmead ... [et al.].
250
$a
1st ed.
260
$a
Indianapolis, Ind. :
$c
c2003.
$b
New Riders,
300
$a
xxvii, 678 p. :
$b
ill. ;
$c
24 cm.
500
$a
Title from ebook title screen (viewed on Apr. 28, 2005).
504
$a
Includes bibliographical references and index.
505
0
$a
Perimeter security fundamentals -- Packet filtering -- Stateful firewalls -- Proxy firewalls -- Security policy -- Role of a router -- Network intrusion detection -- Virtual private networks -- Host hardening -- Host defense components -- Design fundamentals -- Separating resources -- Software architecture -- VPN integration -- Tuning the design for performance -- Sample designs -- Maintaining a security perimeter -- Network log file analysis -- Troubleshooting defense components -- Assessment techniques -- Design under fire -- Importance of defense in depth.
533
$a
Electronic reproduction.
$b
Boulder, Colo. :
$c
NetLibrary,
$d
2005.
$n
Available via World Wide Web.
$n
Access may be limited to NetLibrary affiliated libraries.
650
$a
Computer networks
$x
Security measures.
$3
579161
655
$a
Electronic books.
$2
lcsh
$3
542853
700
$a
Edmead, Mark T.
$3
590293
700
$a
Northcutt, Stephen.
$3
590292
710
$a
NetLibrary, Inc.
$3
542851
856
4 0
$3
Bibliographic record display
$u
http://www.netLibrary.com/urlapi.asp?action=summary&v=1&bookid=128865
$z
An electronic book accessible through the World Wide Web; click for information
994
$a
92
$b
AMF
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9036966
電子資源
11.線上閱覽_V
電子書
EB
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入