Saved in:
Main Author: | |
---|---|
Other Authors: | |
Format: | Electronic eBook |
Language: | English |
Published: |
Boston, MA
Safari Tech Books Online
2005
|
Subjects: | |
Links: | https://learning.oreilly.com/library/view/-/0596007949/?ar |
Summary: | If you're an advanced security professional, then you know that the battle to protect online privacy continues to rage on. Security chat rooms, especially, are resounding with calls for vendors to take more responsibility to release products that are more secure. In fact, with all the information and code that is passed on a daily basis, it's a fight that may never end. Fortunately, there are a number of open source security tools that give you a leg up in the battle. Often a security tool does exactly what you want, right out of the box. More frequently, you need to customize the tool to. |
Item Description: | Title from e-book home page (viewed Jan. 25, 2006). - Print version has edition statement: 1st ed. - Includes index and errata |
Physical Description: | 1 Online-Ressource |
ISBN: | 9781491947425 149194742X 9781491947418 1491947411 0596007949 |
Staff View
MARC
LEADER | 00000cam a22000002c 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-047361883 | ||
003 | DE-627-1 | ||
005 | 20240228114018.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2005 xx |||||o 00| ||eng c | ||
020 | |a 9781491947425 |c electronic bk. |9 978-1-4919-4742-5 | ||
020 | |a 149194742X |c electronic bk. |9 1-4919-4742-X | ||
020 | |a 9781491947418 |c electronic bk. |9 978-1-4919-4741-8 | ||
020 | |a 1491947411 |c electronic bk. |9 1-4919-4741-1 | ||
020 | |a 0596007949 |9 0-596-00794-9 | ||
035 | |a (DE-627-1)047361883 | ||
035 | |a (DE-599)KEP047361883 | ||
035 | |a (ORHE)0596007949 | ||
035 | |a (DE-627-1)047361883 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
072 | 7 | |a BUS |2 bisacsh | |
072 | 7 | |a BUS |2 bisacsh | |
072 | 7 | |a BUS |2 bisacsh | |
072 | 7 | |a BUS |2 bisacsh | |
082 | 0 | |a 658.478 |2 22 | |
100 | 1 | |a Clarke, Justin |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Network security tools |c by Justin Clarke, Nitesh Dhanjani |
264 | 1 | |a Boston, MA |b Safari Tech Books Online |c 2005 | |
300 | |a 1 Online-Ressource | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Title from e-book home page (viewed Jan. 25, 2006). - Print version has edition statement: 1st ed. - Includes index and errata | ||
520 | |a If you're an advanced security professional, then you know that the battle to protect online privacy continues to rage on. Security chat rooms, especially, are resounding with calls for vendors to take more responsibility to release products that are more secure. In fact, with all the information and code that is passed on a daily basis, it's a fight that may never end. Fortunately, there are a number of open source security tools that give you a leg up in the battle. Often a security tool does exactly what you want, right out of the box. More frequently, you need to customize the tool to. | ||
650 | 0 | |a Computer security | |
650 | 0 | |a Computer networks |x Security measures | |
650 | 0 | |a Computers |x Access control | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a Réseaux d'ordinateurs ; Sécurité ; Mesures | |
650 | 4 | |a Ordinateurs ; Accès ; Contrôle | |
650 | 4 | |a BUSINESS & ECONOMICS ; Industrial Management | |
650 | 4 | |a BUSINESS & ECONOMICS ; Management | |
650 | 4 | |a BUSINESS & ECONOMICS ; Management Science | |
650 | 4 | |a BUSINESS & ECONOMICS ; Organizational Behavior | |
650 | 4 | |a Computer networks ; Security measures | |
650 | 4 | |a Computer security | |
650 | 4 | |a Computers ; Access control | |
700 | 1 | |a Dhanjani, Nitesh |e MitwirkendeR |4 ctb | |
776 | 1 | |z 9780596007942 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9780596007942 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/0596007949/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Record in the Search Index
DE-BY-TUM_katkey | ZDB-30-ORH-047361883 |
---|---|
_version_ | 1835903230069964800 |
adam_text | |
any_adam_object | |
author | Clarke, Justin |
author2 | Dhanjani, Nitesh |
author2_role | ctb |
author2_variant | n d nd |
author_facet | Clarke, Justin Dhanjani, Nitesh |
author_role | aut |
author_sort | Clarke, Justin |
author_variant | j c jc |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)047361883 (DE-599)KEP047361883 (ORHE)0596007949 |
dewey-full | 658.478 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 658 - General management |
dewey-raw | 658.478 |
dewey-search | 658.478 |
dewey-sort | 3658.478 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Wirtschaftswissenschaften |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02899cam a22006252c 4500</leader><controlfield tag="001">ZDB-30-ORH-047361883</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228114018.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2005 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781491947425</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-4919-4742-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">149194742X</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-4919-4742-X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781491947418</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-4919-4741-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1491947411</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-4919-4741-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0596007949</subfield><subfield code="9">0-596-00794-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047361883</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047361883</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)0596007949</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047361883</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">BUS</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">BUS</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">BUS</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">BUS</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">658.478</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Clarke, Justin</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Network security tools</subfield><subfield code="c">by Justin Clarke, Nitesh Dhanjani</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boston, MA</subfield><subfield code="b">Safari Tech Books Online</subfield><subfield code="c">2005</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Title from e-book home page (viewed Jan. 25, 2006). - Print version has edition statement: 1st ed. - Includes index and errata</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">If you're an advanced security professional, then you know that the battle to protect online privacy continues to rage on. Security chat rooms, especially, are resounding with calls for vendors to take more responsibility to release products that are more secure. In fact, with all the information and code that is passed on a daily basis, it's a fight that may never end. Fortunately, there are a number of open source security tools that give you a leg up in the battle. Often a security tool does exactly what you want, right out of the box. More frequently, you need to customize the tool to.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computers</subfield><subfield code="x">Access control</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Ordinateurs ; Accès ; Contrôle</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">BUSINESS & ECONOMICS ; Industrial Management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">BUSINESS & ECONOMICS ; Management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">BUSINESS & ECONOMICS ; Management Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">BUSINESS & ECONOMICS ; Organizational Behavior</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers ; Access control</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Dhanjani, Nitesh</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9780596007942</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9780596007942</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/0596007949/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-047361883 |
illustrated | Not Illustrated |
indexdate | 2025-06-25T12:15:57Z |
institution | BVB |
isbn | 9781491947425 149194742X 9781491947418 1491947411 0596007949 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2005 |
publishDateSearch | 2005 |
publishDateSort | 2005 |
publisher | Safari Tech Books Online |
record_format | marc |
spelling | Clarke, Justin VerfasserIn aut Network security tools by Justin Clarke, Nitesh Dhanjani Boston, MA Safari Tech Books Online 2005 1 Online-Ressource Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Title from e-book home page (viewed Jan. 25, 2006). - Print version has edition statement: 1st ed. - Includes index and errata If you're an advanced security professional, then you know that the battle to protect online privacy continues to rage on. Security chat rooms, especially, are resounding with calls for vendors to take more responsibility to release products that are more secure. In fact, with all the information and code that is passed on a daily basis, it's a fight that may never end. Fortunately, there are a number of open source security tools that give you a leg up in the battle. Often a security tool does exactly what you want, right out of the box. More frequently, you need to customize the tool to. Computer security Computer networks Security measures Computers Access control Sécurité informatique Réseaux d'ordinateurs ; Sécurité ; Mesures Ordinateurs ; Accès ; Contrôle BUSINESS & ECONOMICS ; Industrial Management BUSINESS & ECONOMICS ; Management BUSINESS & ECONOMICS ; Management Science BUSINESS & ECONOMICS ; Organizational Behavior Computer networks ; Security measures Computers ; Access control Dhanjani, Nitesh MitwirkendeR ctb 9780596007942 Erscheint auch als Druck-Ausgabe 9780596007942 |
spellingShingle | Clarke, Justin Network security tools Computer security Computer networks Security measures Computers Access control Sécurité informatique Réseaux d'ordinateurs ; Sécurité ; Mesures Ordinateurs ; Accès ; Contrôle BUSINESS & ECONOMICS ; Industrial Management BUSINESS & ECONOMICS ; Management BUSINESS & ECONOMICS ; Management Science BUSINESS & ECONOMICS ; Organizational Behavior Computer networks ; Security measures Computers ; Access control |
title | Network security tools |
title_auth | Network security tools |
title_exact_search | Network security tools |
title_full | Network security tools by Justin Clarke, Nitesh Dhanjani |
title_fullStr | Network security tools by Justin Clarke, Nitesh Dhanjani |
title_full_unstemmed | Network security tools by Justin Clarke, Nitesh Dhanjani |
title_short | Network security tools |
title_sort | network security tools |
topic | Computer security Computer networks Security measures Computers Access control Sécurité informatique Réseaux d'ordinateurs ; Sécurité ; Mesures Ordinateurs ; Accès ; Contrôle BUSINESS & ECONOMICS ; Industrial Management BUSINESS & ECONOMICS ; Management BUSINESS & ECONOMICS ; Management Science BUSINESS & ECONOMICS ; Organizational Behavior Computer networks ; Security measures Computers ; Access control |
topic_facet | Computer security Computer networks Security measures Computers Access control Sécurité informatique Réseaux d'ordinateurs ; Sécurité ; Mesures Ordinateurs ; Accès ; Contrôle BUSINESS & ECONOMICS ; Industrial Management BUSINESS & ECONOMICS ; Management BUSINESS & ECONOMICS ; Management Science BUSINESS & ECONOMICS ; Organizational Behavior Computer networks ; Security measures Computers ; Access control |
work_keys_str_mv | AT clarkejustin networksecuritytools AT dhanjaninitesh networksecuritytools |