Saved in:
Main Author: | |
---|---|
Format: | Electronic Video |
Language: | English |
Published: |
[Place of publication not identified]
InfiniteSkills
2014
|
Subjects: | |
Links: | https://learning.oreilly.com/library/view/-/9781771372923/?ar |
Summary: | "In this Network Technology and Security Fundamentals training course, expert author David Miller teaches you how to secure and protect information as it flows across an enterprise network. This course is designed for users that are working in or looking to move up in the field of Information Technology. You will start by reviewing the Open Systems Interconnect (OSI) model, then jump into learning the TCP/IP suite of protocols. David will then cover transmission media and technologies. This video tutorial will also look at the devices that make up the network infrastructure, including firewalls, routers, Virtual Private Networks (VPNs), client systems, and virtual machines. Next, you will learn about wireless networks, devices, and security. Finally, David will cover the various types of attacks on networks, including browsing attacks, information theft, and attacks on cell phones."--Resource description page. |
Item Description: | Title from resource description page (viewed Nov. 5, 2014) |
Physical Description: | 1 online resource (1 streaming video file (8 hr., 17 min., 33 sec.)) |
ISBN: | 9781771372923 1771372923 |
Staff View
MARC
LEADER | 00000cgm a22000002c 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-047671963 | ||
003 | DE-627-1 | ||
005 | 20240228115709.0 | ||
006 | m o | | | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2014 xx ||| |o o ||eng c | ||
020 | |a 9781771372923 |9 978-1-77137-292-3 | ||
020 | |a 1771372923 |9 1-77137-292-3 | ||
035 | |a (DE-627-1)047671963 | ||
035 | |a (DE-599)KEP047671963 | ||
035 | |a (ORHE)9781771372923 | ||
035 | |a (DE-627-1)047671963 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
100 | 1 | |a Miller, David |d 1959 November 5- |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Learning network technology and security fundamentals |c David Miller |
264 | 1 | |a [Place of publication not identified] |b InfiniteSkills |c 2014 | |
300 | |a 1 online resource (1 streaming video file (8 hr., 17 min., 33 sec.)) | ||
336 | |a zweidimensionales bewegtes Bild |b tdi |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Title from resource description page (viewed Nov. 5, 2014) | ||
520 | |a "In this Network Technology and Security Fundamentals training course, expert author David Miller teaches you how to secure and protect information as it flows across an enterprise network. This course is designed for users that are working in or looking to move up in the field of Information Technology. You will start by reviewing the Open Systems Interconnect (OSI) model, then jump into learning the TCP/IP suite of protocols. David will then cover transmission media and technologies. This video tutorial will also look at the devices that make up the network infrastructure, including firewalls, routers, Virtual Private Networks (VPNs), client systems, and virtual machines. Next, you will learn about wireless networks, devices, and security. Finally, David will cover the various types of attacks on networks, including browsing attacks, information theft, and attacks on cell phones."--Resource description page. | ||
650 | 0 | |a Local area networks (Computer networks) |x Security measures | |
650 | 0 | |a Computer networks |x Security measures | |
650 | 4 | |a Réseaux locaux (Informatique) ; Sécurité ; Mesures | |
650 | 4 | |a Réseaux d'ordinateurs ; Sécurité ; Mesures | |
650 | 4 | |a Computer networks ; Security measures |0 (OCoLC)fst00872341 | |
650 | 4 | |a Local area networks (Computer networks) ; Security measures |0 (OCoLC)fst01001219 | |
650 | 4 | |a Electronic videos | |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781771372923/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
935 | |c vide | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Record in the Search Index
DE-BY-TUM_katkey | ZDB-30-ORH-047671963 |
---|---|
_version_ | 1833357155576578048 |
adam_text | |
any_adam_object | |
author | Miller, David 1959 November 5- |
author_facet | Miller, David 1959 November 5- |
author_role | aut |
author_sort | Miller, David 1959 November 5- |
author_variant | d m dm |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)047671963 (DE-599)KEP047671963 (ORHE)9781771372923 |
format | Electronic Video |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02642cgm a22004332c 4500</leader><controlfield tag="001">ZDB-30-ORH-047671963</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228115709.0</controlfield><controlfield tag="006">m o | | </controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2014 xx ||| |o o ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781771372923</subfield><subfield code="9">978-1-77137-292-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1771372923</subfield><subfield code="9">1-77137-292-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047671963</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047671963</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781771372923</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047671963</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Miller, David</subfield><subfield code="d">1959 November 5-</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Learning network technology and security fundamentals</subfield><subfield code="c">David Miller</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Place of publication not identified]</subfield><subfield code="b">InfiniteSkills</subfield><subfield code="c">2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (1 streaming video file (8 hr., 17 min., 33 sec.))</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">zweidimensionales bewegtes Bild</subfield><subfield code="b">tdi</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Title from resource description page (viewed Nov. 5, 2014)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"In this Network Technology and Security Fundamentals training course, expert author David Miller teaches you how to secure and protect information as it flows across an enterprise network. This course is designed for users that are working in or looking to move up in the field of Information Technology. You will start by reviewing the Open Systems Interconnect (OSI) model, then jump into learning the TCP/IP suite of protocols. David will then cover transmission media and technologies. This video tutorial will also look at the devices that make up the network infrastructure, including firewalls, routers, Virtual Private Networks (VPNs), client systems, and virtual machines. Next, you will learn about wireless networks, devices, and security. Finally, David will cover the various types of attacks on networks, including browsing attacks, information theft, and attacks on cell phones."--Resource description page.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Local area networks (Computer networks)</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux locaux (Informatique) ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield><subfield code="0">(OCoLC)fst00872341</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Local area networks (Computer networks) ; Security measures</subfield><subfield code="0">(OCoLC)fst01001219</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronic videos</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781771372923/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="935" ind1=" " ind2=" "><subfield code="c">vide</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-047671963 |
illustrated | Not Illustrated |
indexdate | 2025-05-28T09:47:12Z |
institution | BVB |
isbn | 9781771372923 1771372923 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 online resource (1 streaming video file (8 hr., 17 min., 33 sec.)) |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | InfiniteSkills |
record_format | marc |
spelling | Miller, David 1959 November 5- VerfasserIn aut Learning network technology and security fundamentals David Miller [Place of publication not identified] InfiniteSkills 2014 1 online resource (1 streaming video file (8 hr., 17 min., 33 sec.)) zweidimensionales bewegtes Bild tdi rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Title from resource description page (viewed Nov. 5, 2014) "In this Network Technology and Security Fundamentals training course, expert author David Miller teaches you how to secure and protect information as it flows across an enterprise network. This course is designed for users that are working in or looking to move up in the field of Information Technology. You will start by reviewing the Open Systems Interconnect (OSI) model, then jump into learning the TCP/IP suite of protocols. David will then cover transmission media and technologies. This video tutorial will also look at the devices that make up the network infrastructure, including firewalls, routers, Virtual Private Networks (VPNs), client systems, and virtual machines. Next, you will learn about wireless networks, devices, and security. Finally, David will cover the various types of attacks on networks, including browsing attacks, information theft, and attacks on cell phones."--Resource description page. Local area networks (Computer networks) Security measures Computer networks Security measures Réseaux locaux (Informatique) ; Sécurité ; Mesures Réseaux d'ordinateurs ; Sécurité ; Mesures Computer networks ; Security measures (OCoLC)fst00872341 Local area networks (Computer networks) ; Security measures (OCoLC)fst01001219 Electronic videos |
spellingShingle | Miller, David 1959 November 5- Learning network technology and security fundamentals Local area networks (Computer networks) Security measures Computer networks Security measures Réseaux locaux (Informatique) ; Sécurité ; Mesures Réseaux d'ordinateurs ; Sécurité ; Mesures Computer networks ; Security measures (OCoLC)fst00872341 Local area networks (Computer networks) ; Security measures (OCoLC)fst01001219 Electronic videos |
subject_GND | (OCoLC)fst00872341 (OCoLC)fst01001219 |
title | Learning network technology and security fundamentals |
title_auth | Learning network technology and security fundamentals |
title_exact_search | Learning network technology and security fundamentals |
title_full | Learning network technology and security fundamentals David Miller |
title_fullStr | Learning network technology and security fundamentals David Miller |
title_full_unstemmed | Learning network technology and security fundamentals David Miller |
title_short | Learning network technology and security fundamentals |
title_sort | learning network technology and security fundamentals |
topic | Local area networks (Computer networks) Security measures Computer networks Security measures Réseaux locaux (Informatique) ; Sécurité ; Mesures Réseaux d'ordinateurs ; Sécurité ; Mesures Computer networks ; Security measures (OCoLC)fst00872341 Local area networks (Computer networks) ; Security measures (OCoLC)fst01001219 Electronic videos |
topic_facet | Local area networks (Computer networks) Security measures Computer networks Security measures Réseaux locaux (Informatique) ; Sécurité ; Mesures Réseaux d'ordinateurs ; Sécurité ; Mesures Computer networks ; Security measures Local area networks (Computer networks) ; Security measures Electronic videos |
work_keys_str_mv | AT millerdavid learningnetworktechnologyandsecurityfundamentals |