<?xml version="1.0" encoding="UTF-8"?>
<collection xmlns="http://www.loc.gov/MARC21/slim">
 <record>
  <leader>02614nam a2200301 a 4500</leader>
  <controlfield tag="001">1/44945</controlfield>
  <controlfield tag="008">140721s2003    ne            001 0 eng  </controlfield>
  <datafield tag="020" ind1=" " ind2=" ">
   <subfield code="a">9781555582982</subfield>
  </datafield>
  <datafield tag="020" ind1=" " ind2=" ">
   <subfield code="a">1555582982</subfield>
  </datafield>
  <datafield tag="035" ind1=" " ind2=" ">
   <subfield code="l">47902</subfield>
  </datafield>
  <datafield tag="040" ind1=" " ind2=" ">
   <subfield code="a">OPELS</subfield>
   <subfield code="b">eng</subfield>
   <subfield code="c">OPELS</subfield>
   <subfield code="d">OKU</subfield>
   <subfield code="d">OCLCQ</subfield>
   <subfield code="d">OCLCO</subfield>
   <subfield code="d">OCLCF</subfield>
   <subfield code="d">GR-PeUP</subfield>
  </datafield>
  <datafield tag="100" ind1="1" ind2=" ">
   <subfield code="a">Speed, Tim.</subfield>
  </datafield>
  <datafield tag="245" ind1="1" ind2="0">
   <subfield code="a">Internet security</subfield>
   <subfield code="h">[electronic resource] :</subfield>
   <subfield code="b">a jumpstart for systems administrators and IT managers /</subfield>
   <subfield code="c">Tim Speed, Juanita Ellis.</subfield>
  </datafield>
  <datafield tag="260" ind1=" " ind2=" ">
   <subfield code="a">Amsterdam ;</subfield>
   <subfield code="a">London :</subfield>
   <subfield code="b">Digital Press,</subfield>
   <subfield code="c">c2003.</subfield>
  </datafield>
  <datafield tag="300" ind1=" " ind2=" ">
   <subfield code="a">1 online resource (xviii, 398 p.) :</subfield>
   <subfield code="b">ill.</subfield>
  </datafield>
  <datafield tag="500" ind1=" " ind2=" ">
   <subfield code="a">Includes index.</subfield>
  </datafield>
  <datafield tag="504" ind1=" " ind2=" ">
   <subfield code="a">Includes bibliographical references (p. 321-389) and index.</subfield>
  </datafield>
  <datafield tag="505" ind1="0" ind2=" ">
   <subfield code="a">The Internet and security -- The security review process -- Cryptography -- Secure networks -- Protecting your intranet from the extranet and Internet -- Authentication and authorization -- E-commerce : public key infrastructure -- Messaging security -- What are we doing here? -- Disaster recovery.</subfield>
  </datafield>
  <datafield tag="520" ind1=" " ind2=" ">
   <subfield code="a">Internet Security incorporates not only the technology needed to support a solid security strategy but also those policies and processes that must be incorporated in order for that strategy to work. New methods of breaking into corporate networks are resulting in major losses. This book provides the latest information on how to guard against attacks and informs the IT manager of the products that can detect and prevent break-ins. Crucial concepts such as authentication and encryption are explained, enabling the reader to understand when and where these technologies will be useful. Due to the authors' experiences in helping corporations develop secure networks, they are able to include the newest methods for protecting corporate data. Shield data from both the internal and external intruder Discover products that can detect and prevent these break-ins Protect against major losses with the latest incident handling procedures for detecting and recovering data from new viruses Get details of a full security business review from performing the security risk analysis to justifying security expenditures based on your company's business needs.</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="4">
   <subfield code="a">Internet</subfield>
   <subfield code="x">Security measures.</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="4">
   <subfield code="a">Computer networks</subfield>
   <subfield code="x">Security measures.</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="4">
   <subfield code="a">Computer security.</subfield>
  </datafield>
  <datafield tag="655" ind1=" " ind2="4">
   <subfield code="a">Electronic books.</subfield>
  </datafield>
  <datafield tag="700" ind1="1" ind2=" ">
   <subfield code="a">Ellis, Juanita.</subfield>
  </datafield>
  <datafield tag="852" ind1=" " ind2=" ">
   <subfield code="a">INST</subfield>
   <subfield code="b">UNIPILB</subfield>
   <subfield code="c">EBOOKS</subfield>
   <subfield code="e">20140721</subfield>
   <subfield code="p">00b47902</subfield>
   <subfield code="q">00b47902</subfield>
   <subfield code="t">ONLINE</subfield>
   <subfield code="y">0</subfield>
  </datafield>
  <datafield tag="856" ind1="4" ind2="0">
   <subfield code="3">ScienceDirect</subfield>
   <subfield code="u">http://www.sciencedirect.com/science/book/9781555582982</subfield>
  </datafield>
  <datafield tag="856" ind1="4" ind2=" ">
   <subfield code="d">/webopac/covers/03/47902_9781555582982.jpg</subfield>
  </datafield>
  <datafield tag="856" ind1="4" ind2=" ">
   <subfield code="d">/webopac/covers/03/47902_1555582982.jpg</subfield>
  </datafield>
 </record>
</collection>
