Entry Hare:1998:ISC from sysadmin.bib
Last update: Wed Jul 13 02:04:01 2016
Top |
Symbols |
Math |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z
BibTeX entry
@Article{Hare:1998:ISC,
author = "Chris Hare",
title = "{IT} Security Coming of Age",
journal = j-SYS-ADMIN,
volume = "7",
number = "12",
pages = "57--62",
month = dec,
year = "1998",
CODEN = "SYADE7",
ISSN = "1061-2688",
bibdate = "Fri Nov 20 08:49:35 MST 1998",
URL = "http://www.samag.com/",
abstract = "A well-planned security architecture plays a vital
part in the protection of your corporate information.
This article suggests a sample model for the design of
a security infrastructure based on published
documentation and the author's own experience.",
bibsource = "http://www.math.utah.edu/pub/tex/bib/sysadmin.bib",
acknowledgement = ack-nhfb,
}
Related entries
- 7-2-8, 7-8-47,
7(12)31,
8(4)37,
8(4)47,
8(5)45,
8(6)23,
8(6)45,
8(7)35,
8(10)43,
8(11)55,
8(12)47,
8(12)53,
8(12)73,
8(12)77,
9(1)59,
9(2)59,
9(3)33,
9(3)45,
9(4)59,
9(8)69,
9(9)55
- 7-8-8,
7(9)z-z,
8(1)39,
8(2)29,
8(2)43,
8(4)51,
8(4)61,
8(6)45,
8(7)55,
8(9)43,
8(9)73,
8(10)43,
8(10)67,
8(11)29,
8(12)47,
9(5)29,
9(5)43,
9(6)45,
9(6)61,
9(10)73
- architecture, 7-7-8,
9(9)77,
10(3)49,
10(5)43,
10(6)31,
10(9)z-3
- article,
7(2)39,
7(6)37,
7(9)0-1,
7(11)z,
8(1)23,
8(1)37,
8(1)49,
8(2)29,
8(2)z,
8(2)z-1,
8(3)19,
8(4)47,
8(7)35,
8(12)53,
9(4)55,
9(6)45,
9(6)61,
9(6)69,
9(6)77,
9(9)33,
9(9)55,
9(9)77,
9(10)47,
9(10)67,
9(11)55,
9(12)44,
9(12)77,
10(1)67,
10(1)81,
10(3)49
- based,
7(8)19,
8(7)41,
10(1)67,
10(7)47
- coming,
9(1)33
- corporate,
7(1)45,
9(7)z,
9(7)z-7
- design,
8(4)47,
8(5)41,
8(11)45,
8(12)77,
9(7)z,
9(7)z-2,
9(12)35,
10(2)37
- documentation,
7(12)31,
9(3)51,
10(6)z-2
- experience,
5(10)47,
6(8)53,
7(1)53,
8(1)55
- Hare, Chris,
1(1)29,
1(1)53,
1(2)z-6,
1(3)13,
1(4)50,
2(1)64,
2(2)78,
2(3)77,
2(4)35,
2(4)63,
2(5)67,
2(6)6,
3(1)6,
3(4)75,
3(5)48,
4(1)z-2,
4(2)8,
4(5)109,
10(11)35
- information,
2(4)13,
5(3)z-1,
5(10)8,
5(10)66,
6(1)74,
8(1)39,
8(11)35,
9(1)59
- infrastructure,
9(5)51
- model,
5(8)z-1,
8(1)45,
9(5)43,
9(6)45,
9(7)z-3,
9(10)47,
10(10)z-2
- own,
7(12)53,
8(4)47,
9(5)57
- part,
2(1)53,
2(2)69,
3(6)107,
4(1)z-1,
7(2)39,
9(5)51,
9(5)77,
9(6)73,
9(9)23,
9(11)57,
9(11)71,
9(12)71,
9(12)77,
10(1)87,
10(6)41,
10(11)35,
10(12)z-4
- protection,
10(11)35
- published,
7(9)0,
7(9)0-1