Securing Client/Server Computer Networks / Peter T. Davis, editor.
Material type: TextSeries: McGraw-Hill series on computer communicationsPublication details: New York : McGraw-Hill, c1996.Description: xxix, 589 p. : ill. ; 24 cmISBN:- 007015841X
- QA76.9.C55 S37 1996
Item type | Current library | Call number | Copy number | Status | Barcode | |
---|---|---|---|---|---|---|
Books | Library First Floor | QA76.9.C55 S37 1996 (Browse shelf(Opens below)) | 1 | Available | 2627 |
Browsing Library shelves, Shelving location: First Floor Close shelf browser (Hides shelf browser)
No cover image available | No cover image available | |||||||
QA76.9.C55 M52 1997 Microsoft SQL Server Resource Guide / | QA76.9.C55 M52 1997 Microsoft Exchange Server Resource Guide, Supplement / | QA76.9.C55 M528 1997 Microsoft Exchange 5.0 step by step / | QA76.9.C55 S37 1996 Securing Client/Server Computer Networks / | QA76.9.C58 G7552 2006 Grid Computing : Software Environments and Tools / | QA76.9 .C643 1996 Computer Organisation and Architecture : An Introduction / | QA76.9 .C643 1996 Computer Organisation and Architecture : An Introduction / |
Includes bibliographical references and index.
Part 1 The concepts: understanding client/server computing; introducing security concepts; understanding client/server computing standards and guidelines; developing our client/server application. Part 2 The desktop environment: securing the desktop; using DB2/2; using Microsoft Access. Part 3 The application development environment: understanding object-oriented development; understanding rapid application development; developing with CASE tools. Part 4 The communications environment: introducing network security; protecting the network with firewalls, bastions and gateways; screening with routers and hubs; communicating with TCP/IP; understanding OS/2 LAN server; understanding Netware 3.12; grasping system network architecture; communicating with VTAM; managing with NetView. Part 5 The data management environment: operating with OS/400; operating with open VMS; operating with UNIX; operating with MVS/ESA; protecting with resource access control facility; managing with Oracle; managing with DB/2. Appendix: security and control tools.
Each contributor to this book addresses a key aspect of securing client/server networks, discussing security and integrity concerns as they relate to distributed databases; systems availability and performance; and application development and conversion.
There are no comments on this title.