000 01453nam a22002177a 4500
003 LSCPL
005 20191209113028.0
008 130410t2012 ii.ill.g |||| 001 0 eng d
020 _a9788131787014 (pbk)
040 _cNCL
_dLIN2019
082 _a004.6
_bTHO-N 2012 710
100 1 _aThomas, Tom
_91005
245 1 _aNetwork security first-step /
_cby Tom Thomas and Donald Stoddard
260 _aNew Delhi :
_bPearson Education Private Limited,
_c2012 c.
300 _axxiv, 423 p. :
_b ill. ;
_c24 cm.
440 _aFirst-Step Series
_91006
505 _aChapter 1: There be Hackers here------------------------------- Chapter 2: Security Policies------------------------------- Chapter 3: Processes and Procedures------------------------- Chapter 4: Network Security Standards and Guidelines------------------------- Chapter 5: Overview of Security Technologies---------------------------- Chapter 6: Security Protocols----------------------------- Chapter 7: Firewalls---------------------------- Chapter 8: Router Security--------------------------- Chapter 9: IPsec Virtual Private Networks (VPNs)---------------------------- Chapter 10: Wireless Security------------------------------- Chapter 11: Intrusion Detection and Honeypots---------------------------- Chapter 12: Tools of the Trade-----------------------------
650 0 _aComputer networks
_xSecurity measures
_91007
700 1 _aStoddard, Donald
_91008
942 _2ddc
_cBK
999 _c480
_d480