Network security first-step:
Your first step into the world of network security No security experience required Includes clear and easily understood explanations Makes learning easy Your first step to network security begins here! Learn about hackers and their attacks Understand security tools and technologies Defend your netwo...
Gespeichert in:
Beteilige Person: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Indianapolis, Ind.
Cisco Press
2004
|
Schriftenreihe: | First-step series
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781587203206/?ar |
Zusammenfassung: | Your first step into the world of network security No security experience required Includes clear and easily understood explanations Makes learning easy Your first step to network security begins here! Learn about hackers and their attacks Understand security tools and technologies Defend your network with firewalls, routers, and other devices Explore security for wireless networks Learn how to prepare for security incidents Welcome to the world of network security! Computer networks are indispensable-but they're also not secure. With the proliferation of Internet viruses and worms, many people and companies are considering increasing their network security. But first, you need to make sense of this complex world of hackers, viruses, and the tools to combat them. No security experience needed! Network Security First-Step explains the basics of network security in easy-to-grasp language that all of us can understand. This book takes you on a guided tour of the core technologies that make up and control network security. Whether you are looking to take your first step into a career in network security or are interested in simply gaining knowledge of the technology, this book is for you! |
Beschreibung: | Includes index. - Print version record |
Umfang: | 1 Online-Ressource (xxi, 456 Seiten) illustrations |
ISBN: | 9781587203206 1587203200 8131747417 9788131747414 9781587200991 |
Internformat
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-047642939 | ||
003 | DE-627-1 | ||
005 | 20240228114434.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2004 xx |||||o 00| ||eng c | ||
020 | |a 9781587203206 |9 978-1-58720-320-6 | ||
020 | |a 1587203200 |9 1-58720-320-0 | ||
020 | |a 8131747417 |9 81-317-4741-7 | ||
020 | |a 9788131747414 |9 978-81-317-4741-4 | ||
020 | |a 9781587200991 |9 978-1-58720-099-1 | ||
035 | |a (DE-627-1)047642939 | ||
035 | |a (DE-599)KEP047642939 | ||
035 | |a (ORHE)9781587203206 | ||
035 | |a (DE-627-1)047642939 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 005.8 |2 22 | |
100 | 1 | |a Thomas, Thomas M. |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Network security first-step |c Tom Thomas |
264 | 1 | |a Indianapolis, Ind. |b Cisco Press |c 2004 | |
300 | |a 1 Online-Ressource (xxi, 456 Seiten) |b illustrations | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
490 | 0 | |a First-step series | |
500 | |a Includes index. - Print version record | ||
520 | |a Your first step into the world of network security No security experience required Includes clear and easily understood explanations Makes learning easy Your first step to network security begins here! Learn about hackers and their attacks Understand security tools and technologies Defend your network with firewalls, routers, and other devices Explore security for wireless networks Learn how to prepare for security incidents Welcome to the world of network security! Computer networks are indispensable-but they're also not secure. With the proliferation of Internet viruses and worms, many people and companies are considering increasing their network security. But first, you need to make sense of this complex world of hackers, viruses, and the tools to combat them. No security experience needed! Network Security First-Step explains the basics of network security in easy-to-grasp language that all of us can understand. This book takes you on a guided tour of the core technologies that make up and control network security. Whether you are looking to take your first step into a career in network security or are interested in simply gaining knowledge of the technology, this book is for you! | ||
650 | 0 | |a Computer networks |x Security measures | |
650 | 4 | |a Réseaux d'ordinateurs ; Sécurité ; Mesures | |
650 | 4 | |a Computer networks ; Security measures | |
650 | 4 | |a Computer networks ; Security measures | |
776 | 1 | |z 1587200996 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 1587200996 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781587203206/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-047642939 |
---|---|
_version_ | 1821494868393852928 |
adam_text | |
any_adam_object | |
author | Thomas, Thomas M. |
author_facet | Thomas, Thomas M. |
author_role | aut |
author_sort | Thomas, Thomas M. |
author_variant | t m t tm tmt |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)047642939 (DE-599)KEP047642939 (ORHE)9781587203206 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02814cam a22004692 4500</leader><controlfield tag="001">ZDB-30-ORH-047642939</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228114434.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2004 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781587203206</subfield><subfield code="9">978-1-58720-320-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1587203200</subfield><subfield code="9">1-58720-320-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">8131747417</subfield><subfield code="9">81-317-4741-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9788131747414</subfield><subfield code="9">978-81-317-4741-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781587200991</subfield><subfield code="9">978-1-58720-099-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047642939</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047642939</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781587203206</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047642939</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Thomas, Thomas M.</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Network security first-step</subfield><subfield code="c">Tom Thomas</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Indianapolis, Ind.</subfield><subfield code="b">Cisco Press</subfield><subfield code="c">2004</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxi, 456 Seiten)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">First-step series</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index. - Print version record</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Your first step into the world of network security No security experience required Includes clear and easily understood explanations Makes learning easy Your first step to network security begins here! Learn about hackers and their attacks Understand security tools and technologies Defend your network with firewalls, routers, and other devices Explore security for wireless networks Learn how to prepare for security incidents Welcome to the world of network security! Computer networks are indispensable-but they're also not secure. With the proliferation of Internet viruses and worms, many people and companies are considering increasing their network security. But first, you need to make sense of this complex world of hackers, viruses, and the tools to combat them. No security experience needed! Network Security First-Step explains the basics of network security in easy-to-grasp language that all of us can understand. This book takes you on a guided tour of the core technologies that make up and control network security. Whether you are looking to take your first step into a career in network security or are interested in simply gaining knowledge of the technology, this book is for you!</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">1587200996</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">1587200996</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781587203206/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-047642939 |
illustrated | Illustrated |
indexdate | 2025-01-17T11:21:13Z |
institution | BVB |
isbn | 9781587203206 1587203200 8131747417 9788131747414 9781587200991 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (xxi, 456 Seiten) illustrations |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2004 |
publishDateSearch | 2004 |
publishDateSort | 2004 |
publisher | Cisco Press |
record_format | marc |
series2 | First-step series |
spelling | Thomas, Thomas M. VerfasserIn aut Network security first-step Tom Thomas Indianapolis, Ind. Cisco Press 2004 1 Online-Ressource (xxi, 456 Seiten) illustrations Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier First-step series Includes index. - Print version record Your first step into the world of network security No security experience required Includes clear and easily understood explanations Makes learning easy Your first step to network security begins here! Learn about hackers and their attacks Understand security tools and technologies Defend your network with firewalls, routers, and other devices Explore security for wireless networks Learn how to prepare for security incidents Welcome to the world of network security! Computer networks are indispensable-but they're also not secure. With the proliferation of Internet viruses and worms, many people and companies are considering increasing their network security. But first, you need to make sense of this complex world of hackers, viruses, and the tools to combat them. No security experience needed! Network Security First-Step explains the basics of network security in easy-to-grasp language that all of us can understand. This book takes you on a guided tour of the core technologies that make up and control network security. Whether you are looking to take your first step into a career in network security or are interested in simply gaining knowledge of the technology, this book is for you! Computer networks Security measures Réseaux d'ordinateurs ; Sécurité ; Mesures Computer networks ; Security measures 1587200996 Erscheint auch als Druck-Ausgabe 1587200996 |
spellingShingle | Thomas, Thomas M. Network security first-step Computer networks Security measures Réseaux d'ordinateurs ; Sécurité ; Mesures Computer networks ; Security measures |
title | Network security first-step |
title_auth | Network security first-step |
title_exact_search | Network security first-step |
title_full | Network security first-step Tom Thomas |
title_fullStr | Network security first-step Tom Thomas |
title_full_unstemmed | Network security first-step Tom Thomas |
title_short | Network security first-step |
title_sort | network security first step |
topic | Computer networks Security measures Réseaux d'ordinateurs ; Sécurité ; Mesures Computer networks ; Security measures |
topic_facet | Computer networks Security measures Réseaux d'ordinateurs ; Sécurité ; Mesures Computer networks ; Security measures |
work_keys_str_mv | AT thomasthomasm networksecurityfirststep |