01489nam 2200421 450 00000696120070503173100.02-204-01855-620010118d1982----km-y0itay0103----bafreFRA Donat et La vertu de patienceCyprien de Carthageintroduction, traduction et notes de Jean Molager1 0000926Paris<<Les>> edition du cerf1982264 p.19 cm.Sources Chrétiennes291Testo latino a fronte<<La>> vertu de patience239(20. ed.)Apologetica e polemicaCyprianus,Thascius CaeciliusCipriano : di Cartagine439940Molanger,JeanITUniversità della Basilicata - B.I.A.RICAunimarc000006961A Donat et La vertu de patience76241UNIBASMONLETMONOGRLETTERESTIGLIANO0120010118BAS01150520050601BAS011753batch0120050718BAS01104920050718BAS01110820050718BAS01113820050718BAS011152BATCH-UPD0020060525BAS011442BATCH0020070503BAS011731BAS01BAS01BOOKBASA1Polo Storico-UmanisticoGENCollezione generaleFP/917426961L917422001011802Prestabile Generale03013nam 2200589Ia 450 991078046830332120230120004042.01-281-05614-697866110561480-08-047626-0(CKB)111087028318874(EBL)294015(OCoLC)191034910(SSID)ssj0000115674(PQKBManifestationID)11145709(PQKBTitleCode)TC0000115674(PQKBWorkID)10026145(PQKB)11536451(MiAaPQ)EBC294015(Au-PeEL)EBL294015(CaPaEBR)ebr10044830(CaONFJC)MIL105614(EXLCZ)9911108702831887420030717d2003 uy 0engur|n|---|||||txtccrBuilding DMZs for Enterprise networks[electronic resource] /Robert J. Shimonski ... [et al.]Rockland, Mass. Syngressc20031 online resource (831 p.)Includes index.1-931836-88-4 Cover; Contents; Foreword; Chapter 1 DMZ Concepts, Layout, and Conceptual Design; Chapter 2 Windows 2000 DMZ Design; Chapter 3 Sun Solaris DMZ Design; Chapter 4 Wireless DMZs; Chapter 5 Firewall Design: Cisco PIX; Chapter 6 Firewall and DMZ Design: Check Point NG; Chapter 7 Firewall and DMZ Design: Nokia Firewall; Chapter 8 Firewall and DMZ Design: ISA Server 2000; Chapter 9 DMZ Router and Switch Security; Chapter 10 DMZ-Based VPN Services; Chapter 11 Implementing Wireless DMZs; Chapter 12 Sun Solaris Bastion Hosts; Chapter 13 Windows 2000 Bastion Hosts; Chapter 14 Hacking the DMZChapter 15 Intrusion Detection in the DMZAppendix A IIS Web Server Hardening; Index; Related TitlesThis book covers what an administrator needs to plan out and integrate a DMZ into a network for small, medium and Enterprise networks. In most enterprises the perception is that a firewall provides a hardened perimeter. However, the security of internal networks and hosts is usually very soft. In such an environment, a non-DMZ system that is offering services to the Internet creates the opportunity to leapfrog to other hosts in the soft interior of your network. In this scenario your internal network is fair game for any attacker who manages to penetrate your so-called hard perimeter.-Computer networksAccess controlComputer networksSecurity measuresWide area networks (Computer networks)AccessComputer networksAccess control.Computer networksSecurity measures.Wide area networks (Computer networks)Access.005.8Shimonski Robert627583MiAaPQMiAaPQMiAaPQBOOK9910780468303321Building DMZs for Enterprise networks3708765UNINA