Network auditing : a control assessment approach /
"Written by Gordon Smith, a leading expert in the field, this new book - the first to take an in-depth look at intranets and the Internet from an audit and information systems perspective - shows you how to guard against potentially costly cyberhazards."--BOOK JACKET. "Network Auditin...
שמור ב:
| מחבר ראשי: | |
|---|---|
| פורמט: | ספר |
| שפה: | English |
| יצא לאור: |
New York :
John Wiley,
c1999.
|
| נושאים: | |
| גישה מקוונת: | Table of Contents Publisher description Contributor biographical information |
| LEADER | 02727cam a2200373 a 4500 | ||
|---|---|---|---|
| 001 | c000293513 | ||
| 003 | CARM | ||
| 005 | 20090824115542.0 | ||
| 008 | 981113s1999 nyua b 001 0 eng d | ||
| 010 | |a 98051576 | ||
| 015 | |a GB99-52478 | ||
| 019 | 1 | |a 14278822 |z 21396921 |5 LACONCORD2021 | |
| 020 | |a 0471179752 (cloth/Disk : alk. paper) | ||
| 035 | |a (OCoLC)40359444 |5 LACONCORD2021 | ||
| 040 | |a DLC |b eng |c DLC |d DLC |d OrLoB-B |d VCAV | ||
| 050 | 0 | 0 | |a TK5105.5 |b .S623 1999 |
| 100 | 1 | |a Smith, Gordon E. |q (Gordon Edward) | |
| 245 | 1 | 0 | |a Network auditing : |b a control assessment approach / |c Gordon E. Smith. |
| 260 | |a New York : |b John Wiley, |c c1999. | ||
| 300 | |a viii, 343 p. : |b ill. ; |c 25 cm. + |e 1 computer disk (3 1/2 in.) | ||
| 500 | |a Includes index. | ||
| 500 | |a VCAV copy monograph only - disk missing. | ||
| 504 | |a Includes bibliographical references and index. | ||
| 505 | 0 | |a 1. Understanding Networks -- 2. Carrier-Related Issues -- 3. Communications Alternatives -- 4. Internet and Other Public Networks -- 5. Bridges, Routers, and Firewalls -- 6. Interconnected Networks -- 7. Cataloging the Network -- 8. Network Operations and Management -- 9. Risk Management and Mitigation -- App. The Audit Guide for the Interconnected Network Audit. | |
| 520 | 1 | |a "Written by Gordon Smith, a leading expert in the field, this new book - the first to take an in-depth look at intranets and the Internet from an audit and information systems perspective - shows you how to guard against potentially costly cyberhazards."--BOOK JACKET. "Network Auditing provides the tools necessary to detect poorly secured network components and to install strong preventive measures to secure your network. It also provides a sound methodology and practical checklists to identify specific risks facing your network."--BOOK JACKET. "Accompanied by a disk that contains auditing programs for either direct use or individual customization, Network Auditing is essential reading for anyone responsible for safeguarding interconnected corporate systems."--BOOK JACKET. | |
| 650 | 0 | |a Computer networks |x Auditing. | |
| 650 | 0 | |a Business enterprises |x Computer networks |x Management. | |
| 856 | 4 | |3 Table of Contents |u http://www.loc.gov/catdir/toc/onix03/98051576.html | |
| 856 | 4 | 2 | |3 Publisher description |u http://www.loc.gov/catdir/description/wiley032/98051576.html |
| 856 | 4 | 2 | |3 Contributor biographical information |u http://www.loc.gov/catdir/bios/wiley041/98051576.html |
| 852 | 8 | |b CARM |h A3:AD29B0 |i B11372 |p 0531619 |f BK | |
| 082 | 0 | 4 | |a 658.0546 |2 21 |
| 999 | f | f | |i 45d5717b-6d44-5f81-bc8e-0e4b2a70e161 |s ac6f8531-99b5-55c5-8762-fb435085556a |
| 952 | f | f | |p Can circulate |a CAVAL |b CAVAL |c CAVAL |d CARM 1 Store |e B11372 |f A3:AD29B0 |h Other scheme |i book |m 0531619 |