1. |
From the Associate Editor |
|
International Journal of Network Management,
Volume 5,
Issue 4,
1995,
Page 173-173
Ray Sarch,
Preview
|
PDF (86KB)
|
|
ISSN:1055-7148
DOI:10.1002/nem.4560050402
出版商:Wiley Subscription Services, Inc., A Wiley Company
年代:1995
数据来源: WILEY
|
2. |
Disaster recovery long‐range planning: A mandatory evolution for protecting data |
|
International Journal of Network Management,
Volume 5,
Issue 4,
1995,
Page 174-180
Hal Byron Becker,
Preview
|
PDF (710KB)
|
|
摘要:
AbstractThe simplicity of centralized disaster recovery planning is gone forever for many users. It has been replaced with an incredibly complex array of questions and issues that must be explored and resolved. Many factors contribute to this complexity and this article identifies and explores some of them.
ISSN:1055-7148
DOI:10.1002/nem.4560050403
出版商:Wiley Subscription Services, Inc., A Wiley Company
年代:1995
数据来源: WILEY
|
3. |
The World Trade Center Disaster and the Lessons Learned |
|
International Journal of Network Management,
Volume 5,
Issue 4,
1995,
Page 181-184
Cynthia K. Nachsin,
Preview
|
PDF (364KB)
|
|
摘要:
AbstractFor NYNEX, the lessons learned from the explosion and fire in the World Trade Center were both positive and negative.
ISSN:1055-7148
DOI:10.1002/nem.4560050404
出版商:Wiley Subscription Services, Inc., A Wiley Company
年代:1995
数据来源: WILEY
|
4. |
How Safe is Your Data Center? |
|
International Journal of Network Management,
Volume 5,
Issue 4,
1995,
Page 185-187
John E. Nevola,
Preview
|
PDF (263KB)
|
|
摘要:
AbstractThe data center should be separated from the rest of the business and should not house executives, end‐users or non‐essential operational personnel. This configuration isolates the data center from the rest of the enterprise and greatly simplifies the planning of end‐user rec
ISSN:1055-7148
DOI:10.1002/nem.4560050405
出版商:Wiley Subscription Services, Inc., A Wiley Company
年代:1995
数据来源: WILEY
|
5. |
A Corporate Anti‐Virus Strategy |
|
International Journal of Network Management,
Volume 5,
Issue 4,
1995,
Page 189-192
Rebecca Herold,
Preview
|
PDF (371KB)
|
|
摘要:
AbstractThe Principal Finance Group's anti‐virus strategy was implemented at the beginning of 1994. To date, this strategy has been effective in quickly identifying viruses that have entered the company's computers, and removing them in an efficient and timely manne
ISSN:1055-7148
DOI:10.1002/nem.4560050406
出版商:Wiley Subscription Services, Inc., A Wiley Company
年代:1995
数据来源: WILEY
|
6. |
Is It Security or Disaster Recovery? Who Cares? |
|
International Journal of Network Management,
Volume 5,
Issue 4,
1995,
Page 193-197
Steven J. Ross,
Preview
|
PDF (537KB)
|
|
摘要:
AbstractIn dealing with information systems, it does not matter whether efforts are expended toward securing information assets against misuse or protecting them against destruction.
ISSN:1055-7148
DOI:10.1002/nem.4560050407
出版商:Wiley Subscription Services, Inc., A Wiley Company
年代:1995
数据来源: WILEY
|
7. |
Security and the Enterprise Network |
|
International Journal of Network Management,
Volume 5,
Issue 4,
1995,
Page 198-206
David Banes,
Preview
|
PDF (860KB)
|
|
摘要:
AbstractWe'll offer some practical guidelines for assessing security risks that can assist network managers in devising a security strategy appropriate to their particular environments.
ISSN:1055-7148
DOI:10.1002/nem.4560050408
出版商:Wiley Subscription Services, Inc., A Wiley Company
年代:1995
数据来源: WILEY
|
8. |
Planning Disaster Recovery Protection |
|
International Journal of Network Management,
Volume 5,
Issue 4,
1995,
Page 207-213
Al Berman,
Preview
|
PDF (721KB)
|
|
摘要:
AbstractThe era of the LAN has been marked by local responsibilities and autonomous control. While this may have been acceptable during the early stages of development, it is becoming obvious that there need to be standards and controls placed upon this environment.
ISSN:1055-7148
DOI:10.1002/nem.4560050409
出版商:Wiley Subscription Services, Inc., A Wiley Company
年代:1995
数据来源: WILEY
|
9. |
A new era in data network security: Protocol‐sensitive encryption |
|
International Journal of Network Management,
Volume 5,
Issue 4,
1995,
Page 214-218
Dale G. Peterson,
Preview
|
PDF (372KB)
|
|
摘要:
AbstractA protocol‐sensitive security solution becomes a security overlay on top of a data communications network. No modification or access to the data network is required and, if implemented properly, users are unaware that their data is being secure
ISSN:1055-7148
DOI:10.1002/nem.4560050410
出版商:Wiley Subscription Services, Inc., A Wiley Company
年代:1995
数据来源: WILEY
|
10. |
Sidewinder: Defense in depth using type enforcement |
|
International Journal of Network Management,
Volume 5,
Issue 4,
1995,
Page 219-229
Richard E. Smith,
Preview
|
PDF (1098KB)
|
|
摘要:
AbstractSites use firewalls to defend against external attacks while providing necessary Internet services. Firewalls make a site safer: They present a smaller risk since they provide fewer services. However, most firewalls use standard computer operating systems. This can allow an attacker to overrun the firewall if a known security flaw is present. The Sidewinder(TM) firewall system overcomes this problem using type enforcement.Network server applications operate in independently controlled compartments called domains, each granted specific permission to access particular types of files or communicate with other domains. If a server succumbs to an attack, type enforcement restricts the amount of damage an attacker can do. In particular, Sidewinder prevents an attack on an Internet server from accessing domains serving internal, protected networks. An attacker cannot overrun a Sidewinder because the type enforcement restrictions cannot be disabled while the system is handling network traffic.
ISSN:1055-7148
DOI:10.1002/nem.4560050411
出版商:Wiley Subscription Services, Inc., A Wiley Company
年代:1995
数据来源: WILEY
|