Zetech University Library - Online Catalog

Mobile: +254-705278678

Whatsapp: +254-706622557

Feedback/Complaints/Suggestions

library@zetech.ac.ke

Amazon cover image
Image from Amazon.com
Syndetics cover image
Image from Syndetics
Image from Google Jackets
Image from OpenLibrary

Microsoft Windows server 2003 / Kenneth C. Laudon, Kenneth Rosenblatt. designing network security

By: Contributor(s): Material type: TextTextSeries: Interactive computing seriesPublication details: Boston : Irwin/McGraw-Hill, c2005.Edition: Brief edDescription: xiii, 298 p. : col. ill. ; 28 cmISBN:
  • 0131176706
Subject(s): DDC classification:
  • 005.4/469 21
LOC classification:
  • QA76.76.O63 L359 2005
Online resources:
Contents:
Analyzing business and technical requirements -- Planning a framework for designing and implementing security -- Analyzing technical and interoperability constraints -- Designing a public key infrastructure using certificate services -- Designing security for network management -- Designing a security update infrastructure -- Designing a logical authentication strategy -- Designing network infrastructure security -- Designing security based on server roles -- Designing an access control strategy for data -- Creating the physical design for client infrastructure security -- Securing client computers -- Securing internet information services -- Designing security for wireless networks.
Action note:
  • cat 20000613 esc
  • aut 200006 mb
Tags from this library: No tags from this library for this title. Log in to add tags.
Holdings
Item type Current library Collection Call number Copy number Status Date due Barcode
Books Books Zetech Library - TRC General Stacks Non-fiction QA76.76.O63L359 2005 (Browse shelf(Opens below)) C.1 Available Z006411
Books Books Zetech Library - TRC General Stacks Non-fiction QA76.76.O63L359 2005 (Browse shelf(Opens below)) C.2 Available Z006412

Includes index.

Analyzing business and technical requirements -- Planning a framework for designing and implementing security -- Analyzing technical and interoperability constraints -- Designing a public key infrastructure using certificate services -- Designing security for network management -- Designing a security update infrastructure -- Designing a logical authentication strategy -- Designing network infrastructure security -- Designing security based on server roles -- Designing an access control strategy for data -- Creating the physical design for client infrastructure security -- Securing client computers -- Securing internet information services -- Designing security for wireless networks.

cat 20000613 esc UPB

aut 200006 mb UPB

There are no comments on this title.

to post a comment.