Matches in Harvard for { <http://id.lib.harvard.edu/aleph/008711268/catalog> ?p ?o. }
Showing items 1 to 21 of
21
with 100 items per page.
- catalog contributor b12205195.
- catalog contributor b12205196.
- catalog created "c2000.".
- catalog date "2000".
- catalog date "c2000.".
- catalog dateCopyrighted "c2000.".
- catalog description "1. Building a Foundation for Information Security -- 2. Fundamental Elements of Security -- 3. Vulnerabilities to Internet-Attached Networks -- 4. Hacking Isn't beyond the Corporate Perimeter -- 5. Peeking inside a Hacker's Toolbox -- 6. Instrumental Effects for Security Assurance -- 7. Security Technologies -- 8. Physical Security Control -- 9. Logical Access Control -- 10. Application Layer Security -- 11. Introduction to Cryptography -- 12. Transport Layer Cryptography -- 13. Digital Signatures and PPK Cryptography -- 14. Key Management Considerations -- 15. Multifactor Access Controls Using Cryptography -- 16. Minding the Store for the Long Run -- App. A. Sample Internet Security Policy.".
- catalog description "Includes bibliographical references (p. 318-326) and index.".
- catalog extent "x, 356 p. :".
- catalog identifier "081447070X".
- catalog issued "2000".
- catalog issued "c2000.".
- catalog language "eng".
- catalog publisher "New York : AMACOM,".
- catalog subject "005.8 21".
- catalog subject "Computer security.".
- catalog subject "Internet Security measures.".
- catalog subject "TK5105.875.I57 M465 2000".
- catalog tableOfContents "1. Building a Foundation for Information Security -- 2. Fundamental Elements of Security -- 3. Vulnerabilities to Internet-Attached Networks -- 4. Hacking Isn't beyond the Corporate Perimeter -- 5. Peeking inside a Hacker's Toolbox -- 6. Instrumental Effects for Security Assurance -- 7. Security Technologies -- 8. Physical Security Control -- 9. Logical Access Control -- 10. Application Layer Security -- 11. Introduction to Cryptography -- 12. Transport Layer Cryptography -- 13. Digital Signatures and PPK Cryptography -- 14. Key Management Considerations -- 15. Multifactor Access Controls Using Cryptography -- 16. Minding the Store for the Long Run -- App. A. Sample Internet Security Policy.".
- catalog title "The complete guide to Internet security / Mark S. Merkow & James Breithaupt.".
- catalog type "text".