000 | 01552nam a2200205Ia 4500 | ||
---|---|---|---|
008 | 140223b2005 xxu||||| |||| 00| 0 eng d | ||
020 |
_a9788181476210 _c0.00 |
||
082 |
_a005.8 _bRIT |
||
100 | _aRittinghouse, John W. | ||
245 | _aCybersecurity: Operations Handbook | ||
260 |
_aNew Delhi _bElsevier Science _c2005 |
||
300 | _a1287p | ||
500 | _aWhy Worry about Security? Network Security Management Basics Security Foundations Firewalls and Perimeters VPNs and Remote Access Intrusion Detection in Depth Securing Communications Keys, Signatures, Certificates and PKI Hacker Exploits Incident Handling Basics Forensics, Investigation and Response Security Dilligence Business Continuity Planning Auditing Fundamentals Security Management Issues Outsourcing and Security Security Service Level Agreements Future Trends in Security Sample Policy Documents | ||
600 | _aComputer Engineering | ||
700 | _aHancock, William M. | ||
890 | _aIndia | ||
995 |
_ARIT _B003052 _CITT-NIT _D1000.00 _E0 _F049 _G755 _H0 _I0.00 _J1250.00 20% _L20050218 _M08 _UC _W20050309 _XMahajan Book Depot _ZReference |
||
995 |
_ARIT _B003155 _CCEE-PG0 _D1000.00 _E0 _F049 _G796 _H0 _I0.00 _J1250.00 20% _L20050314 _M09 _UC _W20050331 _XMahajan Book Depot _ZGeneral |
||
995 |
_ARIT _B003977 _CCET-NIT _D1250.00 _E0 _F049 _G1566 _H0 _I0.00 _J1000.00 20% _L20051201 _UC _W20051220 _XMahajan Book Depot _ZGeneral |
||
999 |
_c30422 _d30422 |