The Resource The practice of network security : deployment strategies for production environments, Allan Liska
The practice of network security : deployment strategies for production environments, Allan Liska
Resource Information
The item The practice of network security : deployment strategies for production environments, Allan Liska represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in Missouri University of Science & Technology Library.This item is available to borrow from 1 library branch.
Resource Information
The item The practice of network security : deployment strategies for production environments, Allan Liska represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in Missouri University of Science & Technology Library.
This item is available to borrow from 1 library branch.
- Summary
- In The Practice of Network Security , former UUNet networkarchitect Allan Liska shows how to secure enterprise networks in thereal world - where you're constantly under attack and you don't alwaysget the support you need. Liska addresses every facet of networksecurity, including defining security models, access control,Web/DNS/email security, remote access and VPNs, wireless LAN/WANsecurity, monitoring, logging, attack response, and more. Includes adetailed case study on redesigning an insecure enterprise network formaximum security
- Language
- eng
- Extent
- 1 online resource (xxii, 391 pages)
- Note
- Includes index
- Isbn
- 9780130462237
- Label
- The practice of network security : deployment strategies for production environments
- Title
- The practice of network security
- Title remainder
- deployment strategies for production environments
- Statement of responsibility
- Allan Liska
- Language
- eng
- Summary
- In The Practice of Network Security , former UUNet networkarchitect Allan Liska shows how to secure enterprise networks in thereal world - where you're constantly under attack and you don't alwaysget the support you need. Liska addresses every facet of networksecurity, including defining security models, access control,Web/DNS/email security, remote access and VPNs, wireless LAN/WANsecurity, monitoring, logging, attack response, and more. Includes adetailed case study on redesigning an insecure enterprise network formaximum security
- Cataloging source
- OCL
- http://library.link/vocab/creatorName
- Liska, Allan
- Dewey number
- 005.8
- Illustrations
- illustrations
- Index
- index present
- LC call number
- TK5105.59
- LC item number
- .L58 2003
- Literary form
- non fiction
- Nature of contents
- dictionaries
- Series statement
- Prentice Hall PTR series in computer networking and distributed systems
- http://library.link/vocab/subjectName
-
- Computer networks
- Computer networks
- Label
- The practice of network security : deployment strategies for production environments, Allan Liska
- Note
- Includes index
- Carrier category
- online resource
- Carrier category code
-
- cr
- Carrier MARC source
- rdacarrier
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Control code
- 54115296
- Dimensions
- unknown
- Extent
- 1 online resource (xxii, 391 pages)
- Form of item
- online
- Isbn
- 9780130462237
- Media category
- computer
- Media MARC source
- rdamedia
- Media type code
-
- c
- Other control number
-
- 076092018896
- 9780130462237
- Other physical details
- illustrations.
- Sound
- unknown sound
- Specific material designation
- remote
- System control number
- (OCoLC)54115296
- Label
- The practice of network security : deployment strategies for production environments, Allan Liska
- Note
- Includes index
- Carrier category
- online resource
- Carrier category code
-
- cr
- Carrier MARC source
- rdacarrier
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Control code
- 54115296
- Dimensions
- unknown
- Extent
- 1 online resource (xxii, 391 pages)
- Form of item
- online
- Isbn
- 9780130462237
- Media category
- computer
- Media MARC source
- rdamedia
- Media type code
-
- c
- Other control number
-
- 076092018896
- 9780130462237
- Other physical details
- illustrations.
- Sound
- unknown sound
- Specific material designation
- remote
- System control number
- (OCoLC)54115296
Library Links
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.mst.edu/portal/The-practice-of-network-security--deployment/PupQSrhtD4A/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.mst.edu/portal/The-practice-of-network-security--deployment/PupQSrhtD4A/">The practice of network security : deployment strategies for production environments, Allan Liska</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.mst.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.mst.edu/">Missouri University of Science & Technology Library</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Item The practice of network security : deployment strategies for production environments, Allan Liska
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.mst.edu/portal/The-practice-of-network-security--deployment/PupQSrhtD4A/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.mst.edu/portal/The-practice-of-network-security--deployment/PupQSrhtD4A/">The practice of network security : deployment strategies for production environments, Allan Liska</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.mst.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.mst.edu/">Missouri University of Science & Technology Library</a></span></span></span></span></div>