Coverart for item
The Resource The complete guide to Internet security, Mark S. Merkow and James Breithaupt

The complete guide to Internet security, Mark S. Merkow and James Breithaupt

Label
The complete guide to Internet security
Title
The complete guide to Internet security
Statement of responsibility
Mark S. Merkow and James Breithaupt
Creator
Contributor
Subject
Language
eng
http://library.link/vocab/creatorName
Merkow, Mark S
Dewey number
005.8
Index
index present
Literary form
non fiction
Nature of contents
  • dictionaries
  • bibliography
http://library.link/vocab/relatedWorkOrContributorDate
1955-
http://library.link/vocab/relatedWorkOrContributorName
Breithaupt, Jim
http://library.link/vocab/subjectName
  • Internet
  • Computer security
Label
The complete guide to Internet security, Mark S. Merkow and James Breithaupt
Instantiates
Publication
Bibliography note
Includes bibliographical references (pages 318-326) and index
Color
multicolored
Contents
1. Building a Foundation for Information Security -- 2. The Fundamental Elements of Security -- 3. Vulnerabilities to Internet-Attached Networks -- 4. Hacking Isn't beyond the Corporate Perimeter -- 5. Peeking inside a Hacker's Toolbox -- 6. Instrumental Effects for Security Assurance -- 7. Security Technologies -- 8. Physical Security Control -- 9. Logical Access Control -- 10. Application Layer Security -- 11. An Introduction to Cryptography -- 12. Transport Layer Cryptography -- 13. Digital Signatures and PPK Cryptography -- 14. Key Management Considerations -- 15. Multifactor Access Controls Using Cryptography -- 16. Minding the Store for the Long Run -- App. A.A Sample Internet Security Policy -- App. B. Internet Bookmarks to Security-Related Sites -- App. C. Security and Security-Testing Specialists
Control code
ocm44957916
Dimensions
unknown
Extent
1 online resource (x, 356 pages)
Form of item
online
Isbn
9780814423974
Note
eBooks on EBSCOhost
Specific material designation
remote
System control number
(OCoLC)44957916
Label
The complete guide to Internet security, Mark S. Merkow and James Breithaupt
Publication
Bibliography note
Includes bibliographical references (pages 318-326) and index
Color
multicolored
Contents
1. Building a Foundation for Information Security -- 2. The Fundamental Elements of Security -- 3. Vulnerabilities to Internet-Attached Networks -- 4. Hacking Isn't beyond the Corporate Perimeter -- 5. Peeking inside a Hacker's Toolbox -- 6. Instrumental Effects for Security Assurance -- 7. Security Technologies -- 8. Physical Security Control -- 9. Logical Access Control -- 10. Application Layer Security -- 11. An Introduction to Cryptography -- 12. Transport Layer Cryptography -- 13. Digital Signatures and PPK Cryptography -- 14. Key Management Considerations -- 15. Multifactor Access Controls Using Cryptography -- 16. Minding the Store for the Long Run -- App. A.A Sample Internet Security Policy -- App. B. Internet Bookmarks to Security-Related Sites -- App. C. Security and Security-Testing Specialists
Control code
ocm44957916
Dimensions
unknown
Extent
1 online resource (x, 356 pages)
Form of item
online
Isbn
9780814423974
Note
eBooks on EBSCOhost
Specific material designation
remote
System control number
(OCoLC)44957916

Library Locations

    • InternetBorrow it
      Albany, Auckland, 0632, NZ
Processing Feedback ...