|
|
|
|
LEADER |
00000cam a2200000xa 4500 |
001 |
b7610494 |
006 |
m o d |
007 |
cr ||||||||||| |
008 |
000808s2000 nyu ob 001 0 eng d |
005 |
20240520201324.3 |
019 |
|
|
|a 48096308
|a 78543334
|a 532592493
|a 961691171
|a 962565262
|a 1038665717
|a 1105737499
|a 1243587309
|
020 |
|
|
|a 0814423973
|q (electronic bk.)
|
020 |
|
|
|a 9780814423974
|q (electronic bk.)
|
020 |
|
|
|z 081447070X
|
035 |
|
|
|a (OCoLC)ebs44957916
|
035 |
|
|
|a (OCoLC)44957916
|z (OCoLC)48096308
|z (OCoLC)78543334
|z (OCoLC)532592493
|z (OCoLC)961691171
|z (OCoLC)962565262
|z (OCoLC)1038665717
|z (OCoLC)1105737499
|z (OCoLC)1243587309
|
037 |
|
|
|a ebs41882
|
040 |
|
|
|a N$T
|b eng
|e pn
|c N$T
|d OCL
|d OCLCQ
|d MUQ
|d OCLCQ
|d YDXCP
|d OCLCG
|d OCLCQ
|d TUU
|d OCLCQ
|d TNF
|d NEG
|d OCLCO
|d OCLCQ
|d ZCU
|d OCLCF
|d OCLCQ
|d VVN
|d ZYU
|d B24X7
|d NLGGC
|d OCLCO
|d OCLCQ
|d OCLCO
|d OCLCQ
|d AGLDB
|d C@V
|d LIV
|d OCLCQ
|d SAV
|d ICD
|d QT7
|d OCLCA
|d LUE
|d VTS
|d MUO
|d OCLCQ
|d INT
|d TOF
|d OCLCQ
|d COO
|d WYU
|d BRX
|d TKN
|d STF
|d M8D
|d JX9
|d HS0
|d INARC
|d XMC
|d TUHNV
|d OCLCO
|d OCLCQ
|
049 |
|
|
|a GWRE
|
050 |
|
4 |
|a TK5105.875.I57
|b M465 2000eb
|
100 |
1 |
|
|a Merkow, Mark S.
|0 http://id.loc.gov/authorities/names/n88243009
|1 http://isni.org/isni/0000000082700625.
|
245 |
1 |
4 |
|a The complete guide to Internet security /
|c Mark S. Merkow and James Breithaupt.
|
260 |
|
|
|a New York :
|b AMACOM,
|c 2000.
|
300 |
|
|
|a 1 online resource (x, 356 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent.
|
337 |
|
|
|a computer
|b c
|2 rdamedia.
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier.
|
505 |
0 |
|
|a 1. Building a Foundation for Information Security -- 2. The Fundamental Elements of Security -- 3. Vulnerabilities to Internet-Attached Networks -- 4. Hacking Isn't beyond the Corporate Perimeter -- 5. Peeking inside a Hacker's Toolbox -- 6. Instrumental Effects for Security Assurance -- 7. Security Technologies -- 8. Physical Security Control -- 9. Logical Access Control -- 10. Application Layer Security -- 11. An Introduction to Cryptography -- 12. Transport Layer Cryptography -- 13. Digital Signatures and PPK Cryptography -- 14. Key Management Considerations -- 15. Multifactor Access Controls Using Cryptography -- 16. Minding the Store for the Long Run -- App. A.A Sample Internet Security Policy -- App. B. Internet Bookmarks to Security-Related Sites -- App. C. Security and Security-Testing Specialists.
|
504 |
|
|
|a Includes bibliographical references (pages 318-326) and index.
|
588 |
0 |
|
|a Print version record.
|
650 |
|
0 |
|a Internet
|x Security measures.
|0 http://id.loc.gov/authorities/subjects/sh2008104644.
|
650 |
|
0 |
|a Computer security.
|0 http://id.loc.gov/authorities/subjects/sh90001862.
|
650 |
|
7 |
|a Computer security.
|2 fast
|0 (OCoLC)fst00872484.
|
650 |
|
7 |
|a Internet
|x Security measures.
|2 fast
|0 (OCoLC)fst01751426.
|
700 |
1 |
|
|a Breithaupt, Jim,
|d 1955-
|0 http://id.loc.gov/authorities/names/n98056032
|1 http://isni.org/isni/0000000113182702.
|
776 |
0 |
8 |
|i Print version:
|a Merkow, Mark S.
|t Complete guide to Internet security.
|d New York : AMACOM, 2000
|z 081447070X
|w (DLC) 00026634
|w (OCoLC)43590237.
|
856 |
4 |
0 |
|u https://colorado.idm.oclc.org/login?url=https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&site=ehost-live&AN=41882
|z Full Text (via EBSCO)
|
907 |
|
|
|a .b76104941
|b 02-01-23
|c 11-19-13
|
907 |
|
|
|a .b76104941
|b 01-31-23
|c 11-19-13
|
915 |
|
|
|a -
|
944 |
|
|
|a MARS - RDA ENRICHED
|
956 |
|
|
|a EBSCO ebook collection
|
956 |
|
|
|b All EBSCO eBooks
|
998 |
|
|
|a web
|b 01-31-23
|c b
|d b
|e -
|f eng
|g nyu
|h 4
|i 1
|
999 |
f |
f |
|i 9dd791f4-0b2b-5922-9c07-86c196e92c2f
|s 8377efa2-5a5b-58c6-a01d-f306f15f6e5f
|
952 |
f |
f |
|p Can circulate
|a University of Colorado Boulder
|b Online
|c Online
|d Online
|e TK5105.875.I57 M465 2000eb
|h Library of Congress classification
|i web
|n 1
|