|
|
|
|
LEADER |
01993nam a22002897a 4500 |
003 |
AR-BaUNH |
005 |
20230513063108.0 |
008 |
230209s2018 ii ad |r|||| 001 0 eng d |
020 |
|
|
|a 9780070586710
|
040 |
|
|
|a AR-BaUNH
|b spa
|c AR-BaUNH
|d AR-BaUNH
|e aacr
|
082 |
1 |
|
|a 004.6
|
100 |
1 |
|
|9 6503
|a Bragg, Roberta
|
100 |
1 |
|
|9 6504
|a Rhodes-Ousley, Mark
|
100 |
1 |
|
|9 6505
|a Strassberg, Keith
|
245 |
|
|
|a Network security :
|b The Complete Reference
|
250 |
|
|
|a 1a ed. 16a reimp.
|
260 |
|
|
|a Chennai :
|b McGraw Hill,
|c 2018.
|
300 |
|
|
|a 854 p. ;
|c 24 cm.
|
505 |
|
|
|a Acknowledgments. -- Introduction. -- NETWORK SECURITY FOUNDATIONS. -- Network security overview. -- Risk analysis ande defense models. -- Security policy development. -- Security organization. -- ACCESS CONTROL. -- Physical security. -- Authentication and authorization controls. -- Data security architecture. -- Security management architecture. -- NETWORK ARCHITECTURE. -- Network desing considerations. -- Network device security. -- Firewalls. -- Virtual private network security. -- Wireless network security. -- Intrusion-detection systems. -- Integrity and availability architecture. -- Network role-based security. -- OPERATING SYSTEM SECURITY. -- Operation system security models. -- Common unix vulnerabilities. -- Linux security. -- Windows security. -- Novell security. -- APPLICATION SECURITY. -- Principals of appliaction security. -- Writing secure software. -- J2EE security. -- Windows .NET security. -- Database security. -- RESPONSE. -- Disaster recovery and business continuity. -- Attacks and countermeasures. -- Incident response and forensic analysis. -- Legal issues: the laws affecting information security professionals. -- Glossary. -- Index.
|
650 |
|
0 |
|a INFORMÁTICA
|9 1376
|
650 |
|
0 |
|9 6497
|a SEGURIDAD DE REDES
|
650 |
|
0 |
|9 6498
|a ARQUITECTURA DE REDES
|
650 |
|
7 |
|a REDES DE COMPUTADORAS
|9 6493
|
650 |
|
0 |
|a CETI
|9 6648
|
900 |
|
|
|a Bruno
|b Bruno
|
942 |
|
|
|2 ddc
|c LIBROS
|
999 |
|
|
|c 4633
|d 4635
|