It looks like you're offline.
Open Library logo
additional options menu

MARC Record from Miami University of Ohio

Record ID marc_miami_univ_ohio/allbibs0157.out:6072197:1570
Source Miami University of Ohio
Download Link /show-records/marc_miami_univ_ohio/allbibs0157.out:6072197:1570?format=raw

LEADER: 01570cam 22002894a 45e0
001 ocm53068959
005 20041006085200.0
008 030909s2003 flua b 001 0 eng
010 $a2003065209
020 $a0849320429 (alk. paper)
040 $aDLC$cDLC$dYDX$dUKM$dIBS
042 $apcc
049 $aMIAS
050 00 $aQA76.9.A25$bA545 2003
100 1 $aAndress, Amanda
245 10 $aSurviving security :$bhow to integrate people, process, and technology /$cAmanda Andress
250 $a2nd ed
260 $aBoca Raton, FL :$bAuerbach Publications,$c2003
300 $a502 p. :$bill. ;$c25 cm
504 $aIncludes bibliographical references (p. 481-482) and index
505 0 $aWhy do I need security? -- Understanding requirements and risk -- Security policies and procedures -- Cryptography and encryption -- Authentication -- Network architecture and physical security -- Firewalls and perimeter security -- Network management and device security -- Wireless network security -- Intrusion detection -- Remote access -- Host security -- Server security -- Client security -- Application development -- Security maintenance and monitoring -- Vulnerability testing -- Security audits -- Incident response -- Integrating people, process, and technology -- Trends to watch
650 0 $aComputer security$xManagement
650 0 $aData protection
907 $a.b3138299x$b04-26-07$c10-06-04
998 $ascl$b10-29-04$cm$da$e-$feng$gflu$h0$i1
947 $aupd kmf
945 $g1$i35054028490239$j0$lscli $o-$p$0.00$q-$r-$s-$t0$u1$v2$w0$x0$y.i41685544$z10-29-04