Búsqueda

Internet security for business

<?xml version="1.0" encoding="UTF-8" standalone="no"?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<rdf:Description>
<dc:date>1996</dc:date>
<dc:description xml:lang="es">Glosario: P. 425-441</dc:description>
<dc:description xml:lang="es">Sumario: Opportunities... and risks -- Understanding the threats to security -- Building the Internet security program -- Designing and implementing the security program -- Securing the Internet connection -- The firewall -- Securing user services -- Securing business services -- Responding to Internet attacks -- Electronic commerce -- The future of the Internet and Internet security -- Appendixes: Legal and social issues in the worplace. TCP/IP protocol vulnerabilities. Internet security policy. Alliances. Where to find more information -- Glossary</dc:description>
<dc:identifier>https://documentacion.fundacionmapfre.org/documentacion/publico/es/bib/15549.do</dc:identifier>
<dc:language>eng</dc:language>
<dc:publisher>John Wiley and Sons</dc:publisher>
<dc:rights xml:lang="es">InC - http://rightsstatements.org/vocab/InC/1.0/</dc:rights>
<dc:subject xml:lang="es">Internet</dc:subject>
<dc:subject xml:lang="es">Intrusión</dc:subject>
<dc:subject xml:lang="es">Seguridad informática</dc:subject>
<dc:subject xml:lang="es">Empresas</dc:subject>
<dc:subject xml:lang="es">Casos prácticos</dc:subject>
<dc:subject xml:lang="es">Criptografía</dc:subject>
<dc:subject xml:lang="es">Análisis de riesgos</dc:subject>
<dc:subject xml:lang="es">Comercio electrónico</dc:subject>
<dc:type xml:lang="es">Libros</dc:type>
<dc:title xml:lang="es">Internet security for business</dc:title>
<dc:format xml:lang="es">XI, 452 p. : il. ; 24 cm</dc:format>
</rdf:Description>
</rdf:RDF>