Please use this identifier to cite or link to this item:
http://ir.inflibnet.ac.in/handle/1944/211
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Pandya, Shweta | en_US |
dc.contributor.author | Shroff, Bhaumik | en_US |
dc.date.accessioned | 2004-07-30T13:18:42Z | en_US |
dc.date.accessioned | 2010-04-08T08:36:39Z | - |
dc.date.available | 2004-07-30T13:18:42Z | en_US |
dc.date.available | 2010-04-08T08:36:39Z | - |
dc.date.issued | 2003-02 | en_US |
dc.identifier.uri | http://hdl.handle.net/1944/211 | en_US |
dc.description.abstract | 21 st century is marked by spectacular and unprecedented developments in the field of telecommunication. The popularity of this field is gaining momentum, as it is faster, cost-effective and more efficient in resource sharing than any other communication media. Networks are the basis of telecommunication technology. The paper flashes on various aspects of network security and requirement of having sound security policy. The topic of network security policy is dealt with in detail, which is followed by the findings of the survey carried out by the authors. Some suggestions for developing security policy are given with the objective of helping the Library and Information Science professionals. | en_US |
dc.format.extent | 4910 bytes | en_US |
dc.format.mimetype | application/pdf | en_US |
dc.language.iso | en | en_US |
dc.publisher | INFLIBNET Centre | en_US |
dc.subject | Network Security | en_US |
dc.subject | System Architecture | en_US |
dc.subject | Security Policy | en_US |
dc.title | Network Security Policy: A key to successful Network Management | en_US |
dc.type | Article | en_US |
Appears in Collections: | CALIBER 2003:Ahmedabad |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
03cali_42.pdf | 46.08 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.