My Account | Home| Bulletin Board| Cart | Help
Close Session
IISER-KIndian Institute of Science Education & Research - Kolkata
Quick Search
Search Terms:
All Documents
Books
Newspapers
Periodicals
Articles
Theses
E-Books
Database : IISERK

Set Session Filters
Login to ask the library to add a book.
Active Filter Settings
No Active Filters
There are 0 titles in your cart.

Search History
ty:m & bl:m
Special Collections: Audio Cassettes
Special Collections: Government Publications
Special Collections: Maps
Special Collections: Music Scores
Serial Collections: Newspapers
Recommended Reading
first record | previous record | next record | last record
full | marc
Record 1 of 1
You searched IISERK - Subject: Microsoft Windows 2000 (Computer file)
Tag In 1 In 2 Data
001  vtls000011872
003  IISER-K
005  20140514150000.0
006  m d
007  cr cn|||||||||
008  090617s2003 maua s 001 0 eng d
020  \a 9781931836883
020  \a 1931836884
037  \a 100738:100744 \b Elsevier Science & Technology \n http://www.sciencedirect.com
039 9\a 201405141500 \b VLOAD \y 200906171854 \z VLOAD
049  \a TEFA
08204\a 651.84404 \b B932 \2 22
24500\a Building DMZs for Enterprise networks \h [electronic resource] / \c Robert J. Shimonski ... [et al.].
2463 \a DMZs for Enterprise networks
260  \a Rockland, Mass. : \b Syngress Pub., \c c2003.
300  \a xxxvii, 744 p. : \b ill. ; \c 24 cm.
500  \a Includes index.
520  \a This book covers what an administrator needs to plan out and integrate a DMZ into a network for small, medium and Enterprise networks. In most enterprises the perception is that a firewall provides a hardened perimeter. However, the security of internal networks and hosts is usually very soft. In such an environment, a non-DMZ system that is offering services to the Internet creates the opportunity to leapfrog to other hosts in the soft interior of your network. In this scenario your internal network is fair game for any attacker who manages to penetrate your so-called hard perimeter. - There are currently no books written specifically on DMZs - This book will be unique in that it will be the only book that teaches readers how to build a DMZ using all of these products: ISA Server, Check Point NG, Cisco Routers, Sun Servers, and Nokia Security Appliances. - Dr. Thomas W. Shinder is the author of the best-selling book on Microsoft's ISA, Configuring ISA Server 2000. Customers of the first book will certainly buy this book.
533  \a Electronic reproduction. \b Amsterdam : \c Elsevier Science & Technology, \d 2007. \n Mode of access: World Wide Web. \n System requirements: Web browser. \n Title from title screen (viewed on Aug. 2, 2007). \n Access may be restricted to users at subscribing institutions.
650 0\a Computer networks \x Access control.
650 0\a Computer networks \x Security measures.
650 0\a Wide area networks (Computer networks) \x Access.
655 7\a Electronic books. \2 local
7001 \a Shimonski, Robert.
7102 \a ScienceDirect (Online service)
7761 \c Original \z 1931836884 \z 9781931836883 \w (OCoLC)52632635
85640\3 ScienceDirect \u http://www.sciencedirect.com/science/book/9781931836883 \z An electronic book accessible through the World Wide Web; click for information \y An electronic book accessible through the World Wide Web; click for information \y ScienceDirect

Keyword Search

 Words: Search Type:
 
 

Database: IISERK

Any filter options that are chosen below will be combined with the Session Filters and applied to the search.
Nature of Contents Filters Format Filters

Including Excluding

Including Excluding
Language Filters Place of Publication Filters

Including Excluding

Including Excluding
Publication Date Context Date
  -     -  

Set Session Filters
Select below to return to the last:
Copyright © 2014 VTLS Inc. All rights reserved.
VTLS.com