Network SECURITY
A practical guide to designing and implementing a variety of advanced network security mechanisms, defining specific cost-effective strategies and providing step-by-step implementation methodology. The book also provides coverage of the control of viruses and trojan horses.
Saved in:
Main Authors: | , |
---|---|
Format: | Book |
Language: | English |
Published: |
Boston
AP Professional
1994
© 1994 |
Subjects: | |
Online Access: | Click Here to View Status and Holdings. |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
MARC
LEADER | 00000nam#a2200000#i#4501 | ||
---|---|---|---|
001 | wils-103232 | ||
005 | 2020899530 | ||
008 | 200909 1994 -US a|| 001 |#eng#D | ||
020 | # | # | |a 0126380104 |q paperback |
040 | # | # | |a UiTM |e rda |
041 | 0 | # | |a eng |
090 | 0 | 0 | |a TK5105.5 |b .S4257 1994 |
100 | 1 | # | |a Shaffer, Steven L |e author |
245 | 1 | 1 | |a Network SECURITY |c Steven L. Shaffer, Alan R. Simon |
264 | # | 1 | |a Boston |b AP Professional |c 1994 |
264 | # | 1 | |c © 1994 |
300 | # | # | |a xviii, 318 pages |b illustrations |c 24 cm |
336 | # | # | |a text |2 rdacontent |
337 | # | # | |a unmediated |2 rdamedia |
338 | # | # | |a volume |2 rdacarrier |
504 | # | # | |a Includes bibliographical references (p. 303-307) and index |
520 | # | # | |a A practical guide to designing and implementing a variety of advanced network security mechanisms, defining specific cost-effective strategies and providing step-by-step implementation methodology. The book also provides coverage of the control of viruses and trojan horses. |
650 | # | 0 | |a Computer networks |x Security measures |
700 | 1 | # | |a Simon, Alan R |e author |
856 | 4 | 0 | |z Click Here to View Status and Holdings. |u https://opac.uitm.edu.my/opac/detailsPage/detailsHome.jsp?tid=103232 |
964 | # | # | |c BOK |d 01 |
998 | # | # | |a 00264#1a002.8.2||00264#1b002.8.4||01264#1a002.8.2||01264#1b002.8.4||00300##a003.4.1||00300##b003.6.1||00300##c003.5.1||00520##a007.2||00520##b007.2|| |