Active defense : (E-BOOK) (Record no. 191137)
[ view plain ]
| 000 -LEADER | |
|---|---|
| fixed length control field | 01505 a2200229 4500 |
| 003 - CONTROL NUMBER IDENTIFIER | |
| control field | Nust |
| 005 - DATE AND TIME OF LATEST TRANSACTION | |
| control field | 20170207154009.0 |
| 010 ## - LIBRARY OF CONGRESS CONTROL NUMBER | |
| LC control number | 2001088118 |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| International Standard Book Number | 0782129161 |
| 040 ## - CATALOGING SOURCE | |
| Transcribing agency | Nust |
| 082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
| Classification number | 005.8 |
| 100 1# - MAIN ENTRY--PERSONAL NAME | |
| Personal name | Brenton, Chris. |
| 245 10 - TITLE STATEMENT | |
| Title | Active defense : (E-BOOK) |
| Remainder of title | a comprehensive guide to network security / |
| Statement of responsibility, etc. | Chris Brenton with Cameron Hunt. |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
| Place of publication, distribution, etc. | San Francisco : |
| Name of publisher, distributor, etc. | Sybex, |
| Date of publication, distribution, etc. | c2001. |
| 300 ## - PHYSICAL DESCRIPTION | |
| Extent | xxvii, 723 p. : |
| Other physical details | ill. ; |
| Dimensions | 23 cm. + |
| Accompanying material | 1 CD-ROM (4 3/4 in.) |
| 500 ## - GENERAL NOTE | |
| General note | Includes index. |
| 505 ## - FORMATTED CONTENTS NOTE | |
| Formatted contents note | Chapter 1 - Why Secure Your Network? – 8 Chapter 2 - How Much Security Do You Need? – 14 Chapter 3 - Understanding How Network Systems Communicate – 27 Chapter 4 - Topology Security – 62 Chapter 5 - Firewalls – 81 Chapter 6 - Configuring Cisco Router Security Features – 116 Chapter 7 - Check Point’s FireWall-1 – 143 Chapter 8 - Intrusion Detection Systems – 168 Chapter 9 - Authentication and Encryption – 187 Chapter 10 - Virtual Private Networking – 202 Chapter 11 - Viruses, Trojans, and Worms: Oh My! – 218 Chapter 12 - Disaster Prevention and Recovery – 233 Chapter 13 - NetWare – 256 Chapter 14 - NT and Windows 2000 – 273 Chapter 15 - UNIX – 309 Chapter 16 - The Anatomy of an Attack – 334 Chapter 17 - Staying Ahead of Attacks - 352 |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name entry element | Computer networks |
| General subdivision | Security measures. |
| 651 ## - SUBJECT ADDED ENTRY--GEOGRAPHIC NAME | |
| Geographic name | E-BOOK |
| 700 1# - ADDED ENTRY--PERSONAL NAME | |
| Personal name | Hunt, Cameron. |
| 856 42 - ELECTRONIC LOCATION AND ACCESS | |
| Materials specified | Publisher description |
| Uniform Resource Identifier | <a href="http://www.loc.gov/catdir/enhancements/fy0611/2001088118-d.html">http://www.loc.gov/catdir/enhancements/fy0611/2001088118-d.html</a> |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
| Source of classification or shelving scheme | |
| Koha item type | Book |
| Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Collection code | Permanent Location | Current Location | Date acquired | Total Checkouts | Full call number | Barcode | Date last seen | Price effective from | Koha item type |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Military College of Signals (MCS) | Military College of Signals (MCS) | 12/12/2016 | 005.8 CHR | MCSEB-614 | 12/08/2016 | 12/12/2016 | Book |
