000 02104cam a22003977a 4500
999 _c2930
_d2930
001 201124
003 ZET-ke
005 20190816104912.0
008 990127s1999 enka 001 0 eng d
010 _a 99060646
020 _a0131176706
035 _a(DLC)201124
040 _aOKX
_cZET-ke
_dDLC
042 _alccopycat
050 0 0 _aQA76.76.O63
_bL359 2005
082 0 0 _a005.4/469
_221
100 1 _aLaudon, Kenneth C.,
_d1944-
245 1 0 _aMicrosoft Windows server 2003 /
_cKenneth C. Laudon, Kenneth Rosenblatt.
_bdesigning network security
250 _aBrief ed.
260 _aBoston :
_bIrwin/McGraw-Hill,
_cc2005.
300 _axiii, 298 p. :
_bcol. ill. ;
_c28 cm.
440 0 _aInteractive computing series
500 _aIncludes index.
505 _aAnalyzing business and technical requirements -- Planning a framework for designing and implementing security -- Analyzing technical and interoperability constraints -- Designing a public key infrastructure using certificate services -- Designing security for network management -- Designing a security update infrastructure -- Designing a logical authentication strategy -- Designing network infrastructure security -- Designing security based on server roles -- Designing an access control strategy for data -- Creating the physical design for client infrastructure security -- Securing client computers -- Securing internet information services -- Designing security for wireless networks.
583 _acat
_c20000613
_kesc
_5UPB
583 _aaut
_c200006
_kmb
_5UPB
630 0 0 _aMicrosoft Windows (Computer file)
_91523
650 0 _aOperating systems (Computers)
_91410
700 1 _aWatson, Richard
856 4 2 _3Publisher description
_uhttp://www.loc.gov/catdir/description/mh023/99060646.html
856 4 1 _3Table of contents
_uhttp://www.loc.gov/catdir/toc/mh023/99060646.html
906 _a7
_bcbc
_ccopycat
_d3
_encip
_f19
_gy-gencatlg
942 _2lcc
_cBK
_kQA76.76
_m.O63L359 2005