Network auditing : a control assessment approach /

"Written by Gordon Smith, a leading expert in the field, this new book - the first to take an in-depth look at intranets and the Internet from an audit and information systems perspective - shows you how to guard against potentially costly cyberhazards."--BOOK JACKET. "Network Auditin...

תיאור מלא

שמור ב:
מידע ביבליוגרפי
מחבר ראשי: Smith, Gordon E. (Gordon Edward)
פורמט: ספר
שפה:English
יצא לאור: New York : John Wiley, c1999.
נושאים:
גישה מקוונת:Table of Contents
Publisher description
Contributor biographical information
LEADER 02727cam a2200373 a 4500
001 c000293513
003 CARM
005 20090824115542.0
008 981113s1999 nyua b 001 0 eng d
010 |a 98051576 
015 |a GB99-52478 
019 1 |a 14278822  |z 21396921  |5 LACONCORD2021 
020 |a 0471179752 (cloth/Disk : alk. paper) 
035 |a (OCoLC)40359444  |5 LACONCORD2021 
040 |a DLC  |b eng  |c DLC  |d DLC  |d OrLoB-B  |d VCAV 
050 0 0 |a TK5105.5  |b .S623 1999 
100 1 |a Smith, Gordon E.  |q (Gordon Edward) 
245 1 0 |a Network auditing :  |b a control assessment approach /  |c Gordon E. Smith. 
260 |a New York :  |b John Wiley,  |c c1999. 
300 |a viii, 343 p. :  |b ill. ;  |c 25 cm. +  |e 1 computer disk (3 1/2 in.) 
500 |a Includes index. 
500 |a VCAV copy monograph only - disk missing. 
504 |a Includes bibliographical references and index. 
505 0 |a 1. Understanding Networks -- 2. Carrier-Related Issues -- 3. Communications Alternatives -- 4. Internet and Other Public Networks -- 5. Bridges, Routers, and Firewalls -- 6. Interconnected Networks -- 7. Cataloging the Network -- 8. Network Operations and Management -- 9. Risk Management and Mitigation -- App. The Audit Guide for the Interconnected Network Audit. 
520 1 |a "Written by Gordon Smith, a leading expert in the field, this new book - the first to take an in-depth look at intranets and the Internet from an audit and information systems perspective - shows you how to guard against potentially costly cyberhazards."--BOOK JACKET. "Network Auditing provides the tools necessary to detect poorly secured network components and to install strong preventive measures to secure your network. It also provides a sound methodology and practical checklists to identify specific risks facing your network."--BOOK JACKET. "Accompanied by a disk that contains auditing programs for either direct use or individual customization, Network Auditing is essential reading for anyone responsible for safeguarding interconnected corporate systems."--BOOK JACKET. 
650 0 |a Computer networks  |x Auditing. 
650 0 |a Business enterprises  |x Computer networks  |x Management. 
856 4 |3 Table of Contents  |u http://www.loc.gov/catdir/toc/onix03/98051576.html 
856 4 2 |3 Publisher description  |u http://www.loc.gov/catdir/description/wiley032/98051576.html 
856 4 2 |3 Contributor biographical information  |u http://www.loc.gov/catdir/bios/wiley041/98051576.html 
852 8 |b CARM  |h A3:AD29B0  |i B11372  |p 0531619  |f BK 
082 0 4 |a 658.0546  |2 21 
999 f f |i 45d5717b-6d44-5f81-bc8e-0e4b2a70e161  |s ac6f8531-99b5-55c5-8762-fb435085556a 
952 f f |p Can circulate  |a CAVAL  |b CAVAL  |c CAVAL  |d CARM 1 Store  |e B11372  |f A3:AD29B0  |h Other scheme  |i book  |m 0531619