000 01552nam a2200205Ia 4500
008 140223b2005 xxu||||| |||| 00| 0 eng d
020 _a9788181476210
_c0.00
082 _a005.8
_bRIT
100 _aRittinghouse, John W.
245 _aCybersecurity: Operations Handbook
260 _aNew Delhi
_bElsevier Science
_c2005
300 _a1287p
500 _aWhy Worry about Security? Network Security Management Basics Security Foundations Firewalls and Perimeters VPNs and Remote Access Intrusion Detection in Depth Securing Communications Keys, Signatures, Certificates and PKI Hacker Exploits Incident Handling Basics Forensics, Investigation and Response Security Dilligence Business Continuity Planning Auditing Fundamentals Security Management Issues Outsourcing and Security Security Service Level Agreements Future Trends in Security Sample Policy Documents
600 _aComputer Engineering
700 _aHancock, William M.
890 _aIndia
995 _ARIT
_B003052
_CITT-NIT
_D1000.00
_E0
_F049
_G755
_H0
_I0.00
_J1250.00 20%
_L20050218
_M08
_UC
_W20050309
_XMahajan Book Depot
_ZReference
995 _ARIT
_B003155
_CCEE-PG0
_D1000.00
_E0
_F049
_G796
_H0
_I0.00
_J1250.00 20%
_L20050314
_M09
_UC
_W20050331
_XMahajan Book Depot
_ZGeneral
995 _ARIT
_B003977
_CCET-NIT
_D1250.00
_E0
_F049
_G1566
_H0
_I0.00
_J1000.00 20%
_L20051201
_UC
_W20051220
_XMahajan Book Depot
_ZGeneral
999 _c30422
_d30422