by
Lewis, Lundy.
Call Number
658.0546 21
Publication Date
1999
Format:
Electronic Resources
Relevance:
4.7255
by
Kar, Els van de.
Call Number
384.534 22
Publication Date
2007
Format:
Electronic Resources
Relevance:
4.6504
View Other Search Results
by
Dubrawsky, Ido.
Call Number
005.8 22
Publication Date
2006
Summary
This is the only book available on building network DMZs, which are the cornerstone of any good enterprise security configuration. It covers market-leading products from Microsoft, Cisco, and Check Point. One of the most complicated areas of network technology is designing, planning, implementing, and constantly maintaining a demilitarized zone (DMZ) segment. This book is divided into four logical parts. First the reader will learn the concepts and major design principles of all DMZs. Next the reader will learn how to configure the actual hardware that makes up DMZs for both newly constructed and existing networks. Next, the reader will learn how to securely populate the DMZs with systems and services. The last part of the book deals with troubleshooting, maintaining, testing, and implementing security on the DMZ. The only book published on Network DMZs on the components of securing enterprise networks This is the only book available on building network DMZs, which are the cornerstone of any good enterprise security configuration. It covers market-leading products from Microsoft, Cisco, and Check Point Provides detailed examples for building Enterprise DMZs from the ground up and retro-fitting existing infrastructures.
Format:
Electronic Resources
Relevance:
4.5850
by
Hobbs, Martyn.
Call Number
004.0684
Publication Date
2011
Summary
IT Asset Management: A Pocket Survival Guide is a quick reference style guide, addressing such serious issues with a fresh and pragmatic approach. Aimed at IT professionals who have been tasked with putting in place Asset Management disciplines, it first provides a commonsense introduction to the key processes outlined in the Information Technology Infrastructure Library (ITIL®), before proceeding to explain the various milestones of an Asset Management project.
Format:
Electronic Resources
Relevance:
4.2402
by
Tyson, Dave.
Call Number
658.47 22
Publication Date
2007
Format:
Electronic Resources
Relevance:
4.1762
by
Kearney, Paul.
Call Number
005.8019
Publication Date
2010
Summary
This pocket guide is based on the approach used by BT to protect its own data security - one that draws on the capabilities of both people and technology. The guide will prove invaluable for IT managers, information security officers and business executives.
Format:
Electronic Resources
Relevance:
3.9323
by
Axelrod, C. Warren.
Call Number
658.478 22
Publication Date
2009
Summary
Here's a unique and practical book that addresses the rapidly growing problem of information security, privacy, and secrecy threats and vulnerabilities. This authoritative resource helps professionals understand what really needs to be done to protect sensitive data and systems and how to comply with the burgeoning roster of data protection laws and regulations. The book examines the effectiveness and weaknesses of current approaches and guides you towards practical methods and doable processes that can bring about real improvement in the overall security environment. Readers gain insight into the latest security and privacy trends, learn how to determine and mitigate risks, and discover the specific dangers and responses regarding the most critical sectors of a modern economy. -- Publisher description.
Format:
Electronic Resources
Relevance:
3.8560
by
Harrington, Jan L.
Call Number
004.68 22
Publication Date
2007
Summary
In a local area network (LAN) or intranet, there are many pieces of hardare trying to gain access to the network transmission media at the same time (i.e., phone lines, coax, wireless, etc.). However, a network cable or wireless transmission frequency can physically only allow one node to use it at a given time. Therefore, there must be some way to regulate which node has control of the medium (a media access control, or MAC, protocol). Ethernet is a MAC protocol; it is one way to regulate physical access to network tranmission media. Ethernet networking is used primarily by networks that are contained within a single physical location. If you need to design, install, and manage a network in such an envronment, i.e., home or small business office, then this book will give you an in-depth understanding of the technology involved in an Ethernet network. One of the major goals of this book is to demystify the jargon of networks so that the reader gains a working familiarity with common networking terminology and acronyms. In addition, this books explains not only how to choose and configure network hardware but also provides practical information about the types of network devices and software needed to make it all work. Tips and direction on how to manage an Ethernet network are also provided. This book therefore goes beyond the hardware aspects of Ethernet to look at the entire network from bottom to top, along with enough technical detail to enable the reader to make intelligent choices about what types of transmission media are used and the way in which the various parts of the network are interconnected. *Explains how the Ethernet works, with emphasis on current technologies and emerging trends in gigabit and fast Ethernet, WiFi, routers, and security issues *Teaches how to design and select complementary components of Ethernet networks with a focus on home and small business applications *Discuses the various types of cables, software, and hardware involved in constructing, connecting, operating and monitoring Ethernet networks.
Format:
Electronic Resources
Relevance:
3.8189
by
Hayati Hashim.
Call Number
658.84 22
Publication Date
2010
Format:
Electronic Resources
Relevance:
3.7982
by
Pal, Nirmal.
Call Number
658.84 21
Publication Date
2001
Format:
Electronic Resources
Relevance:
3.5787
by
Keijser, Jan Just.
Call Number
004.678 22
Publication Date
2011
Format:
Electronic Resources
Relevance:
3.5502
12.
by
De Kare-Silver, Michael.
Call Number
658.054678 DEK
Publication Date
2001
Format:
Books
Relevance:
3.4783
Limit Search Results