000 | 02104cam a22003977a 4500 | ||
---|---|---|---|
999 |
_c2930 _d2930 |
||
001 | 201124 | ||
003 | ZET-ke | ||
005 | 20190816104912.0 | ||
008 | 990127s1999 enka 001 0 eng d | ||
010 | _a 99060646 | ||
020 | _a0131176706 | ||
035 | _a(DLC)201124 | ||
040 |
_aOKX _cZET-ke _dDLC |
||
042 | _alccopycat | ||
050 | 0 | 0 |
_aQA76.76.O63 _bL359 2005 |
082 | 0 | 0 |
_a005.4/469 _221 |
100 | 1 |
_aLaudon, Kenneth C., _d1944- |
|
245 | 1 | 0 |
_aMicrosoft Windows server 2003 / _cKenneth C. Laudon, Kenneth Rosenblatt. _bdesigning network security |
250 | _aBrief ed. | ||
260 |
_aBoston : _bIrwin/McGraw-Hill, _cc2005. |
||
300 |
_axiii, 298 p. : _bcol. ill. ; _c28 cm. |
||
440 | 0 | _aInteractive computing series | |
500 | _aIncludes index. | ||
505 | _aAnalyzing business and technical requirements -- Planning a framework for designing and implementing security -- Analyzing technical and interoperability constraints -- Designing a public key infrastructure using certificate services -- Designing security for network management -- Designing a security update infrastructure -- Designing a logical authentication strategy -- Designing network infrastructure security -- Designing security based on server roles -- Designing an access control strategy for data -- Creating the physical design for client infrastructure security -- Securing client computers -- Securing internet information services -- Designing security for wireless networks. | ||
583 |
_acat _c20000613 _kesc _5UPB |
||
583 |
_aaut _c200006 _kmb _5UPB |
||
630 | 0 | 0 |
_aMicrosoft Windows (Computer file) _91523 |
650 | 0 |
_aOperating systems (Computers) _91410 |
|
700 | 1 | _aWatson, Richard | |
856 | 4 | 2 |
_3Publisher description _uhttp://www.loc.gov/catdir/description/mh023/99060646.html |
856 | 4 | 1 |
_3Table of contents _uhttp://www.loc.gov/catdir/toc/mh023/99060646.html |
906 |
_a7 _bcbc _ccopycat _d3 _encip _f19 _gy-gencatlg |
||
942 |
_2lcc _cBK _kQA76.76 _m.O63L359 2005 |