01486 a2200217 4500003000500000005001700005010001700022020001500039040000900054082001400063100002600077245008300103260005900186300003500245505073300280650004201013650002301055700002601078856008801104856007601192Nust20230821125550.0 a 2003051481 c1555583067 cNust00a005.8,RIT1 aRittinghouse, John W.10aCybersecurity operations handbook /cJohn W. Rittinghouse, William M. Hancock. aAmsterdam ;aBoston :bElsevier Digital Press,cc2003. axli, 1287 p. :bill. ;c26 cm. aWhy Worry about Security (Page-1), Network Security Management Basics (Page 25), Security Foundations (Page-63), Firewalls and Perimeters (Page-115), VPNS and Remote Access (Page-155), Intrusion Detection in Depth (Page-191), Securing Communications (Page-231), Keys, Signatures, Certificates and PKI (Page-269), Hacker Exploits (Page-293), Incident Handling Basics (Page-323), Forensics, Investigation and Response (Page-365), Security Diligence (Page-427), Business Continuity Planning (Page-441), Auditing fundamentals (Page-457), Security Management issues (Page-493), Outsourcing and Security (Page-525), Security Service level Agreements (Page-581), Future Trends in Security (Page-601),Sample Policy Documents (Page-631), 0aComputer networksxSecurity measures. 0aComputer security.1 aHancock, Bill,d1957-423Publisher descriptionuhttp://www.loc.gov/catdir/description/els031/2003051481.html423Table of contentsuhttp://www.loc.gov/catdir/toc/els031/2003051481.html