Usted se encuentra revisando un registro bibliográfico de la BDU Para conocer mas sobre la Base de Datos Unificada haga click en el ícono del home

Titulos:
CIW security proffesional certification bible / Mandy Andress; Phil Cox; editado por Tittel
Idiomas:
eng
ISBN:
0764548220
Lugar de Edición:
New York:
Editor:
Hungry Minds,
Fecha de Edición:
2001
Notas Formateada:
Part I: Introducing computer security concepts - Chapter 1: A security primer - Chapter 2: Basic principles of system and network security - Chapter 3: Using encryption technologies - Chapter 4: Securing TCP/IP -- Part II: Network security - Chapter 5: Security incidents and attacks - Chapter 6: Understanding boundary devices - Chapter 7: Implementing firewalls -- Part III: Operating system security -Chapter 8: Operating system security risks - Chapter 9: Principles of operaring system security - Chapter 10: Operating system hardening -Chapter 11: Securing file systems and resources - Chapter 12: Securing user accounts -- Part IV: Intrusion detection and response - Chapter 13: Defeating network and server attacks and penetration -Chapter 14: Intrusion detection and prevention -Chapter 15: Intrusion detection systems - Chapter 16: Handling security incidents -- Part V: Security auditing, analysis, and intrusion detection - Chapter 17: Principle of security auditing - Chapter 18: System security scanning and discovery -Chapter 19: Creating and managing security control procedures - Chapter 20: Auditing system and security logs - Chapter 21: Acting on audit results
Palabras clave:

Leader:
cam
Campo 003:
AR-BaIT
Campo 008:
220402s2001t |||||||||||||||||eng
Campo 020:
^a0764548220
Campo 040:
^aITBA^cITBA
Campo 041:
0 ^aeng
Campo 100:
1 ^aAndress, Mandy^92269
Campo 245:
10^aCIW security proffesional certification bible /^cMandy Andress; Phil Cox; editado por Tittel
Campo 246:
Campo 260:
^aNew York:^bHungry Minds,^c2001
Campo 300:
^axxxii, 638 p.
Campo 505:
0 ^aPart I: Introducing computer security concepts - Chapter 1: A security primer - Chapter 2: Basic principles of system and network security - Chapter 3: Using encryption technologies - Chapter 4: Securing TCP/IP -- Part II: Network security - Chapter 5: Security incidents and attacks - Chapter 6: Understanding boundary devices - Chapter 7: Implementing firewalls -- Part III: Operating system security -Chapter 8: Operating system security risks - Chapter 9: Principles of operaring system security - Chapter 10: Operating system hardening -Chapter 11: Securing file systems and resources - Chapter 12: Securing user accounts -- Part IV: Intrusion detection and response - Chapter 13: Defeating network and server attacks and penetration -Chapter 14: Intrusion detection and prevention -Chapter 15: Intrusion detection systems - Chapter 16: Handling security incidents -- Part V: Security auditing, analysis, and intrusion detection - Chapter 17: Principle of security auditing - Chapter 18: System security scanning and discovery -Chapter 19: Creating and managing security control procedures - Chapter 20: Auditing system and security logs - Chapter 21: Acting on audit results
Campo 700:
1 ^aCox, Phil^94732
Campo 700:
1 ^915666^aTittel, Ed
Proveniencia:
^aInstituto Tecnológico Buenos Aires (ITBA) - Biblioteca
Seleccionar y guardar el registro Haga click en el botón del carrito
Institucion:
Instituto Tecnológico Buenos Aires (ITBA)
Dependencia:
Biblioteca

Compartir este registro en Redes Sociales

Seleccionar y guardar el registro Haga click en el botón del carrito