feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    Online Resource
    Online Resource
    Amsterdam ; : Elsevier Digital Press,
    UID:
    almahu_9948026365902882
    Format: 1 online resource (1331 p.)
    Edition: 1st ed.
    ISBN: 1-281-03527-0 , 9786611035273 , 0-08-053018-4
    Content: Cybersecurity Operations Handbook is the first book for daily operations teams who install, operate and maintain a range of security technologies to protect corporate infrastructure. Written by experts in security operations, this book provides extensive guidance on almost all aspects of daily operational security, asset protection, integrity management, availability methodology, incident response and other issues that operational teams need to know to properly run security products and services in a live environment. Provides a master document on Mandatory FCC Best Practices and compl
    Note: Description based upon print version of record. , Front Cover; Cybersecurity Operations Handbook; Copyright Page; Contents; List of Figures; List of Tables; Foreword; Preface; Acknowledgments; Disclaimer; Chapter 1. Why Worry about Security? I; 1.1 Threats to personal privacy; 1.2 Fraud and theft; 1.3 Employee sabotage; 1.4 Infrastructure attacks; 1.5 Malicious hackers; 1.6 Malicious code; 1.7 Industrial espionage; 1.8 The 1996 National Information Infrastructure Protection Act; 1.9 President's executive order on critical infrastructure protection; 1.10 The USA Patriot Act of 2001; 1.11 The Homeland Security Act of 2002; 1.12 Chapter summary , 1.13 EndnotesChapter 2. Network Security Management Basics; 2.1 Foundations of information assurance; 2.2 Defense-in-depth strategy; 2.3 Overview of RFC 2196 (Site Security Handbook); 2.4 The Common Criteria model; 2.5 Privacy standards and regulations; 2.6 Password management; 2.7 Incident handling; 2.8 Information warfare and information operations; 2.9 Web security overview; 2.10 Chapter summary; 2.11 Endnotes; Chapter 3. Security Foundations; 3.1 Access control; 3.2 Purpose of access control; 3.3 Access control entities; 3.4 Fundamental concepts of access control , 3.5 Access control criteria3.6 Access control models; 3.7 Uses of access control; 3.8 Access control administration models; 3.9 Access control mechanisms; 3.10 Physical and environmental security controls; 3.11 Applications development security; 3.12 Standardization of application security features; 3.13 Techniques to enforce application security; 3.14 Security architecture; 3.15 Security and the law; 3.16 Investigations; 3.17 Ethics; 3.18 Operations security; 3.19 Host-based intrusion detection; 3.20 Network-based detection efforts; 3.21 Chapter summary; 3.22 Endnotes , Chapter 4. Firewalls and Perimeters4.1 Firewall environments; 4.2 Perimeter concepts; 4.3 How intruders break; 4.4 What is a firewall?; 4.5 Static packet filtering; 4.6 Edge, or boundary, routers and packet filters; 4.7 Stateful filtering and inspection; 4.8 Proxy servers; 4.9 Circuit gateways; 4.10 Application gateway; 4.11 Chapter summary; 4.12 Endnotes; Chapter 5. VPNs and Remote Access; 5.1 Historical evolution of the VPN; 5.2 VPN basics; 5.3 Why is a VPN needed?; 5.4 VPN security essentials; 5.5 VPN tunneling and protocols; 5.6 Business benefits of VPNs; 5.7 A case study , 5.8 Chapter summary5.9 Endnotes; Chapter 6. Intrusion Detection in Depth; 6.1 Basic intrusion detection concepts; 6.2 Types of IDSs; 6.3 IDS detectable attack types; 6.4 Understanding TCP/IP for intrusion detection; 6.5 Tcpdump overview; 6.6 Case study-Kevin Mitnik; 6.7 Chapter summary; 6.8 Endnotes; Chapter 7. Securing Communications; 7.1 Cryptography; 7.2 Cryptographic techniques; 7.3 Cryptographic keys; 7.4 Cryptographic hash functions; 7.5 Digital signatures; 7.6 Secret-key cryptography; 7.7 Public-key cryptography; 7.8 OpenPGP; 7.9 Cryptanalysis and cryptographic attack techniques , 7.10 Steganography , English
    Additional Edition: ISBN 1-55558-306-7
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Boston :Digital Press,
    UID:
    almahu_9949697322302882
    Format: 1 online resource (689 p.)
    Edition: 2nd ed.
    ISBN: 1-281-01982-8 , 9786611019822 , 0-08-051259-3 , 1-4356-0106-8
    Content: Networking Explained 2E offers a comprehensive overview of computer networking, with new chapters and sections to cover the latest developments in the field, including voice and data wireless networking, multimedia networking, and network convergence.Gallo and Hancock provide a sophisticated introduction to their subject in a clear, readable format. These two top networking experts answer hundreds of questions about hardware, software, standards, and future directions in network technology.Wireless networksConvergence of voice and dataMultimedia networking
    Note: Description based upon print version of record. , Front Cover; Networking Explained; Copyright Page; Contents; Preface; Chapter 1. Fundamental Concepts of Computer Networks and Networking; Concepts and Related Issues of Computer Networking; Definition and Components of Computer Networks; Network Protocols; Network Media; Applications Versus Application Protocols; Interoperability; Internet, internet (Internetwork), Intranet, Extranet; LAN, MAN, WAN, PAN, GAN, SAN; Decentralized Versus Centralized Versus Distributed Systems; Client/Server, Peer-to-Peer, Servent, and WWW Network Models; Network Appliances; Serial and Parallel Communications , Synchronous, Asynchronous, and Isochronous CommunicationsSimplex, Half-Duplex, and Full-Duplex Communications; Network Standards; Chapter 2. Network Topologies, Architectures, and the OSI Model; Concept of Network Topologies; Point-to-Point Networks: Star, Loop, Tree; Broadcast Networks: Bus, Ring, Satellite; Multidrop Networks; Circuit- and Packet-Switched Networks; Network Architectures; The OSI Model; Connection-Oriented and Connectionless Services; The TCP/IP Model; Chapter 3. The Internet and TCP/IP; Definition of the Internet; Internet History; The Current Commodity Internet , Other Internet Initiatives: vBNS/vBNS+, Internet2, Next Generation InternetInternet Administration, Governance, and Standards; History of TCP/IP; TCP/IP Application Layer Protocols: SMTP, MIME, POP, IMAP, TELNET, FTP, and HTTP; TCP/IP Transport Layer Protocols: UDP and TCP; TCP/IP Network Layer Protocol: IP; IPv4 Addresses and Subnetting; IP Address Assignments; IP Name Resolution; IPv6; Internet Services, Resources, and Security; Chapter 4. Physical Layer Concepts; Physical Layer Issues; Analog Versus Digital Communications; Bandwidth Versus Throughput and Data Rate Versus Baud Rate; Noise , Shannon's LimitMultiplexers and Multiplexing Strategies; Switching Strategies; Physical and Electrical Characteristics of Wire; UTP, STP, and IBM Cable; Coaxial Cable; Fiber-Optic Cable; Wireless Media; Satellite Communications; Chapter 5. Data Link Layer Concepts and IEEE Standards; Data Link Layer Overview and IEEE's Framing Prespective; Framing; Ethernet/802.3 Frames; Flow Control and Flow Control Protocols; Error Control; MAC Sublayer; Random Access and Token Passing Protocols; Data Prioritization and Quality of Service (QoS); Chapter 6. Network Hardware Components (Layers 1 and 2) , ConnectorsTransceivers; Repeaters; Media Converters; Network Interface and PC Cards; Bridges; Switches; Chapter 7. WANS, Internetworking, and Network Layer Concepts and Components; The Concept of Internetworking; WAN Circuits; SONET; Layer 3 Concepts and Issues; Router Protocols and Routing Algorithms; Routing Versus Switching; Virtual Private Networks (VPNs); Multiprotocol Label Switching (MPLS); Chapter 8. Ethernet, Ethernet, and More Ethernet; History of Ethernet; Ethernet Versus IEEE 802.3; The Initial IEEE 802.3 Protocol: 10 Mbps Ethernet , 10-Mbps Ethernet Performance Issues: Network Diameter and Collision Domain , English
    Additional Edition: ISBN 1-55558-252-4
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    UID:
    kobvindex_ZLB13333664
    Format: 28 Min.
    Content: Records the bebop dance style and life of Baby Laurence who "led tap into its last creative phase" (Marshall Sterns, Jazz Dance). "His legs and feet were speed and thunder and surprise."New Yorker In addition to performances of his unique style, we are also treated to a vivid history of tap with demonstrations of the steps used by other famous tap dancers: King Rastus Brown, Bill Robinson, John Bubbles. Unusual film clips of Charlie Parker and Art Tatum illustrate the music that inspired Baby Laurence. (from the container)
    Note: Engl.
    In: The sound of Miles Davis : [Video]
    Language: English
    Keywords: Steptanz ; Geschichte ; Videokassette ; Videokassette
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    Amsterdam ; : Elsevier Digital Press,
    UID:
    almahu_9947931437002882
    Format: xli, 1287 p. : , ill.
    Edition: Electronic reproduction. Ann Arbor, MI : ProQuest, 2015. Available via World Wide Web. Access may be limited to ProQuest affiliated libraries.
    Language: English
    Keywords: Electronic books. ; Electronic books.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    UID:
    kobvindex_ZLB14233693
    Content: This exciting 1981 release showcases the life and work of the indisputable king of jazz tap, Baby Laurence. While most tap dancers were hanging up their shoes with the emergence of bebop, Baby Laurence was busy pioneering a new style of jazz tap designed to accompany the likes of such legendary figures as Art Tatum, Charlie Parker, Dizzy Gillespie and Bud Powell. In addition to exciting footage of Laurence performing with a modern jazz band, this documentary boasts a detailed history of tap featuring Laurence`s demonstrations of the steps used by other legendary tap dancers such as King Rastus Brown, Bill Robinson and John Bubbles. The film also boasts rare archival clips of Art Tatum, Charlie Parker and Dizzy Gillespie, as well as an outstanding rendition of Laurence's "An Afternoon in Percussion," featuring the tap king in a heated battle with an excellent jazz drummer. (Covertext)
    Note: "Billy's bounce". The tap clinic. Art tatum. Early tap. The Hoofer's Club. Charlie Parker and Dizzy Gillespie. Breaking down bars. History of tap. Bill "Bojangles" Robinson. John Bubbles. "An afternoon in percussion". The decline of the tap era. "Billy's bounce reprise". Death of a legend , Engl.
    In: Portrait of Pee Wee Russell : [DVD Video], Andorra, [ca. 2006], (2006)
    Language: English
    Author information: Parker, Charlie
    Author information: Tatum, Art
    Author information: Gillespie, Dizzy
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    Book
    Book
    Wellesley, Mass. :QED Information Sciences,
    UID:
    almafu_BV026328631
    Format: 155 S.
    Edition: 2. ed.
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Implementation ; Rechnernetz ; Lokales Netz ; Ethernet
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    Boston :Digital Press,
    UID:
    almahu_9947931598302882
    Format: xvi, 672 p. : , ill.
    Edition: 2nd ed.
    Edition: Electronic reproduction. Ann Arbor, MI : ProQuest, 2016. Available via World Wide Web. Access may be limited to ProQuest affiliated libraries.
    Language: English
    Keywords: Electronic books.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages